From 564c63bbdc9dfad04969b02a5ec528e8101e7869 Mon Sep 17 00:00:00 2001 From: sivolko Date: Sat, 4 Jan 2025 20:29:02 +0530 Subject: [PATCH] added MFA blog --- ...tofool-yourself-enablinng-sms-based-2FA.md | 55 ++ .../index.html | 18 +- .../index.html | 18 +- _site/Docker-101/index.html | 18 +- .../index.html | 12 +- .../index.html | 18 +- .../index.html | 18 +- .../index.html | 12 +- _site/Progressive-web-app/index.html | 18 +- _site/Progressive-webapps-on-azure/index.html | 18 +- .../index.html | 18 +- _site/access-management-101/index.html | 18 +- _site/authors/shubhendu/index.html | 2 +- .../index.html | 18 +- .../index.html | 18 +- _site/azure-networking-101/index.html | 18 +- _site/benifits-of-CI/index.html | 18 +- _site/best-linux-cheatsheet-101/index.html | 18 +- .../index.html | 856 ++++++++++++++++++ .../index.html | 18 +- .../index.html | 18 +- _site/category/automation/index.html | 2 + _site/category/azure/index.html | 2 + _site/category/code/index.html | 2 + _site/category/css/index.html | 2 + _site/category/devops/index.html | 2 + _site/category/docker/index.html | 2 + _site/category/linux/index.html | 2 + _site/category/music/index.html | 2 + _site/category/networking/index.html | 2 + _site/category/security/index.html | 2 + _site/category/tips/index.html | 2 + _site/category/travel/index.html | 2 + _site/category/tutorial/index.html | 2 + _site/category/webapps/index.html | 2 + .../index.html | 18 +- _site/college-to-cyber-security/index.html | 18 +- _site/computer-networking-basics/index.html | 18 +- .../index.html | 24 +- .../difference-between-WAF-and-IPS/index.html | 18 +- _site/feed.xml | 30 +- .../index.html | 12 +- .../index.html | 18 +- .../index.html | 18 +- .../index.html | 18 +- .../index.html | 18 +- _site/index.html | 2 +- _site/kali-linux-vs-parrot-linux/index.html | 18 +- _site/living-without-passwords/index.html | 18 +- .../index.html | 18 +- _site/search.json | 8 + .../index.html | 18 +- _site/sitemap.xml | 7 + .../index.html | 18 +- .../index.html | 18 +- _site/tags/index.html | 2 +- _site/the-blue-team-protecting-you/index.html | 18 +- .../index.html | 18 +- .../index.html | 18 +- _site/waf-vs-firewall/index.html | 12 +- .../index.html | 18 +- _site/what-is-chat-gpt/index.html | 18 +- .../index.html | 18 +- .../index.html | 18 +- 64 files changed, 1340 insertions(+), 388 deletions(-) create mode 100644 _posts/2025-01-04-best-way-tofool-yourself-enablinng-sms-based-2FA.md create mode 100644 _site/best-way-tofool-yourself-enablinng-sms-based-2FA/index.html diff --git a/_posts/2025-01-04-best-way-tofool-yourself-enablinng-sms-based-2FA.md b/_posts/2025-01-04-best-way-tofool-yourself-enablinng-sms-based-2FA.md new file mode 100644 index 00000000..c08dc661 --- /dev/null +++ b/_posts/2025-01-04-best-way-tofool-yourself-enablinng-sms-based-2FA.md @@ -0,0 +1,55 @@ +--- +layout: post +title: The Best Way to Fool Yourself:Use SMS 2FA +subtitle: Is your 2FA reliable? +description: Let's get concept clear what's Log analytics and log analytics workspace +image: https://res.cloudinary.com/hugs4bugs/image/upload/v1735990558/hugs4bugs/MFA/profile_u7ic2x.jpg +optimized_image: https://res.cloudinary.com/hugs4bugs/image/upload/v1735990558/hugs4bugs/MFA/profile_u7ic2x.jpg +author: Shubhendu Shubham +date: 2025-01-04 00:00:00 Z +category: Identity & Access +tags: +- Cyber Security +--- + +Okay in this blog I'm not gonna tell you about sim swapping or OTP bypassing or hijacking, I'll try to keep as realistic I can for all layman people. Before we jump into our main topic let's clear a few terms like MFA == Multifactor Authenticator , 2FA == Two Factor Authenticator. + +Now let's understand the problem statement with example of a person name called "Sivolko". Meet sivolko, a software developer who relies heavily on various online accounts for both work and personal use. Sivolko is well aware of securing these accounts and has enabled Multifactor Authenticator (MFA) on all of them.Unlikely many common people, sivolko uses SMS-based MFA especially for Email and he often uses Gmail as primary email and another gmail as backup but he haven't logged in to his backup gmail account since couple of months. + +However Sivolko is about to discover that this method,while seemingly secure can lead to some significant complications. Let's breakdown complications :- + +**The Problem with SMS-Based MFA** + +One day sivolko loses his smartphone while communiting to work.Panic sets in as sivolko realises that without the smartphone, he can't receive OTPs needed to access their accounts. so what could be common issues for him ? Let's break down them as well + +1. **Lost Phone or SIM Card** : Without smartphone sivolko can't receive the OTP via SMS. Usually gmail sends 6 or 7 numeric OTP which starts with "G". So what he'll try , use another method to authenticate option given by Gmail. Now he is supposed to enter his backup email address, which he remembers now it asks to enter password for the back email address as well, Here comes the twist since it was his backup email address he was not using it frequently so obvious reason he don't remember . Now when he tries to reset password for his backup email it sends OTP to his phone which is already lost ? + +2. **Forgotten Backup Email Password**: Sivolko tries to use the backup email for account recovery but realizes they haven't accessed it in months and have forgotten the password. This creates a frustrating loop where Sivolko can't access the OTP sent to the backup email. + +3. **Circular Problem**: With both the primary and backup methods failing, Sivolko is stuck in a loop where they can't access their accounts. This defeats the purpose of MFA, which is supposed to make accounts more secure, not more complicated. + + +*Before jumping to advance solution for this situation let's understand what could be better here, Sivolko might have used different SIM or phone numbers for both primary and backup emails. Another both numbers should not be in same phone or device, incase of lost still another phone or SIM could be easily accessible. Another point is he could have allowed sync in option in all devices where he still get option to "tap to verify" on another logged in devices with same primary or secondary email.* + +So let's see the standard Industrial grade solutions. + +**Use FIDO Keys or Authenticator Apps?** + +Sivolko starts researching alternative MFA methods and discovers FIDO (Fast Identity Online) keys and authenticator apps. Here's why these might be better options: + +1. **FIDO Keys**: These are physical devices that Shubham can plug into their computer or connect via Bluetooth. They provide a secure way to authenticate without relying on SMS or email. FIDO keys use public key cryptography to verify identity, meaning that even if someone steals Sivolko's password, they won't be able to access the account without the physical key. + +2. **Authenticator Apps**: Apps like Google Authenticator or Microsoft Authenticator app which generate OTPs on Sivolo's phone without needing a cellular connection. Even if Sivolko loses their phone, they can often restore accounts on a new device using backup codes. Authenticator apps are more secure than SMS-based MFA because they don't rely on a phone number, which can be easily spoofed or intercepted. + +**Final Verdict** +Sivolko decides to implement some practical solutions to avoid future complications: + +1. **Use Authenticator Apps**: Sivolko sets up an authenticator app on their phone and saves the backup codes provided during setup. These codes can be used to restore access if the phone is lost. Authenticator apps are easy to use and provide a higher level of security than SMS-based MFA. + +2. **Backup Email**: Sivolko regularly checks and updates their backup email, ensuring they remember the password or have a secure way to recover it. Sivolko also uses a different email provider for the backup email to reduce the risk of both accounts being compromised at the same time. + +3. **FIDO Keys**: Sivolko invests in a FIDO key for an extra layer of security. These keys are highly secure and can be used across multiple devices. FIDO keys are especially useful for securing high-value accounts, such as email or bank accounts. + +4. **Multiple Recovery Options**: Sivolko uses a combination of recovery options. For example, they set up both an authenticator app and a FIDO key. This way, if one method fails, there's a backup. Sivolko also sets up recovery options for the recovery options, such as a backup phone number or email address. + +Lemme know if you have been in situtation like sivolko or do you have other solutions to deal with it. \ No newline at end of file diff --git a/_site/2021-08-2-Understanding-basics-of-security/index.html b/_site/2021-08-2-Understanding-basics-of-security/index.html index a3c10e5d..315374fa 100644 --- a/_site/2021-08-2-Understanding-basics-of-security/index.html +++ b/_site/2021-08-2-Understanding-basics-of-security/index.html @@ -346,29 +346,29 @@

See also

  • - + - + -

    Access Management 101.

    +

    WAF vs IPS

  • - + - + -

    Why new session should be created during user authentication?

    +

    Azure Networking 101

  • - + - + -

    Tools that SOC/Security Analyst must know

    +

    Automation with Jenkins and GitHub

  • diff --git a/_site/Automation-with-Jenkins-and-Github/index.html b/_site/Automation-with-Jenkins-and-Github/index.html index 8141669e..65f5bd11 100644 --- a/_site/Automation-with-Jenkins-and-Github/index.html +++ b/_site/Automation-with-Jenkins-and-Github/index.html @@ -479,29 +479,29 @@

    See also

  • - + - + -

    Automate Email with Azure Logic App

    +

    WAF vs Firewall

  • - + - + -

    Search engines one should know as a CyberSecurity enthausist!

    +

    Streamline Security :Wazuh in Docker with Kali

  • - + - + -

    Access Management 101.

    +

    Do you use ls -lrt?

  • diff --git a/_site/Docker-101/index.html b/_site/Docker-101/index.html index a33eb51e..db131e4e 100644 --- a/_site/Docker-101/index.html +++ b/_site/Docker-101/index.html @@ -625,29 +625,29 @@

    See also

  • - + - + -

    Managing and Storing Secrets:Azure Vault.🙆

    +

    Streamline Security :Wazuh in Docker with Kali

  • - + - + -

    Progressive WebApp.

    +

    Fundamentals of Network Security.☠️

  • - + - + -

    WAF vs IPS

    +

    Demystifying Log Analytics vs Log Analytics Workspace in MS Sentinel

  • diff --git a/_site/Fundamentals-of-Network-security/index.html b/_site/Fundamentals-of-Network-security/index.html index 7fe940a0..0cce2c72 100644 --- a/_site/Fundamentals-of-Network-security/index.html +++ b/_site/Fundamentals-of-Network-security/index.html @@ -485,11 +485,11 @@

    See also

  • - + - + -

    Progressive WebApp.

    +

    What is chatGpt? How to use it?

  • @@ -503,11 +503,11 @@

    Demystifying Log Analytics vs Log Analytics Workspace in MS Sentinel

  • - + - + -

    Access Management 101.

    +

    The Blue Team.☠️

  • diff --git a/_site/How-to-install-Jenkins-on-Linux/index.html b/_site/How-to-install-Jenkins-on-Linux/index.html index d3b5963a..5e1c8b68 100644 --- a/_site/How-to-install-Jenkins-on-Linux/index.html +++ b/_site/How-to-install-Jenkins-on-Linux/index.html @@ -433,29 +433,29 @@

    See also

  • - + - + -

    How to create & Manage users and Groups within Azure AD.

    +

    Fundamentals of Network Security.☠️

  • - + - + -

    Building and Deploying PWA on Azure Cloud.

    +

    How to like Instagram posts with JavaScript?

  • - + - + -

    How to install ThreatMapper in Kali Linux?

    +

    Access Management 101.

  • diff --git a/_site/How-to-install-threatmapper-in-kali-linux/index.html b/_site/How-to-install-threatmapper-in-kali-linux/index.html index 3188edd4..fb0fe29e 100644 --- a/_site/How-to-install-threatmapper-in-kali-linux/index.html +++ b/_site/How-to-install-threatmapper-in-kali-linux/index.html @@ -486,29 +486,29 @@

    See also

  • - + - + -

    Computer Networking 101

    +

    Fundamentals of Network Security.☠️

  • - + - + -

    Wazuh's Big Move:From Elasticsearch to OpenSearch

    +

    Building and Deploying PWA on Azure Cloud.

  • - + - + -

    Azure Networking 101

    +

    Live without passwords

  • diff --git a/_site/How-to-onboard-your-Microsoft-Sentinel-from-scratch/index.html b/_site/How-to-onboard-your-Microsoft-Sentinel-from-scratch/index.html index 7df973dd..481793c7 100644 --- a/_site/How-to-onboard-your-Microsoft-Sentinel-from-scratch/index.html +++ b/_site/How-to-onboard-your-Microsoft-Sentinel-from-scratch/index.html @@ -431,20 +431,20 @@

    Fundamentals of Network Security.☠️

  • - + - + -

    Metasploit Framework vs Metasploit Pro

    +

    Live without passwords

  • - + - + -

    The Blue Team.☠️

    +

    Automate Firebase hosting with Github Actions and Ruby.

  • diff --git a/_site/Progressive-web-app/index.html b/_site/Progressive-web-app/index.html index 3b1fa9cc..41c1d6cf 100644 --- a/_site/Progressive-web-app/index.html +++ b/_site/Progressive-web-app/index.html @@ -801,29 +801,29 @@

    See also

  • - + - + -

    Benifits of CI/CD

    +

    Kali Linux vs Parrot OS

  • - + - + -

    What is chatGpt? How to use it?

    +

    Streamline Security :Wazuh in Docker with Kali

  • - + - + -

    Docker 101

    +

    Microsoft Defender for Cloud 101

  • diff --git a/_site/Progressive-webapps-on-azure/index.html b/_site/Progressive-webapps-on-azure/index.html index fa6e80db..01130e9a 100644 --- a/_site/Progressive-webapps-on-azure/index.html +++ b/_site/Progressive-webapps-on-azure/index.html @@ -1304,29 +1304,29 @@

    See also

  • - + - + -

    The Blue Team.☠️

    +

    How to create & Manage users and Groups within Azure AD.

  • - + - + -

    Streamline Security :Wazuh in Docker with Kali

    +

    Docker 101

  • - + - + -

    Docker 101

    +

    Managing and Storing Secrets:Azure Vault.🙆

  • diff --git a/_site/What-is-Microsoft-Defender-Threat-Intelligence(MDTI)/index.html b/_site/What-is-Microsoft-Defender-Threat-Intelligence(MDTI)/index.html index 6c961b22..99965f97 100644 --- a/_site/What-is-Microsoft-Defender-Threat-Intelligence(MDTI)/index.html +++ b/_site/What-is-Microsoft-Defender-Threat-Intelligence(MDTI)/index.html @@ -424,29 +424,29 @@

    See also

  • - + - + -

    Automation with Jenkins and GitHub

    +

    The Best Way to Fool Yourself:Use SMS 2FA

  • - + - + -

    Progressive WebApp.

    +

    How to install ThreatMapper in Kali Linux?

  • - + - + -

    Demystifying Log Analytics vs Log Analytics Workspace in MS Sentinel

    +

    Automation with Jenkins and GitHub

  • diff --git a/_site/access-management-101/index.html b/_site/access-management-101/index.html index c74682ca..b5ae9276 100644 --- a/_site/access-management-101/index.html +++ b/_site/access-management-101/index.html @@ -424,29 +424,29 @@

    See also

  • - + - + -

    Why new session should be created during user authentication?

    +

    Metasploit Framework vs Metasploit Pro

  • - + - + -

    Wazuh's Big Move:From Elasticsearch to OpenSearch

    +

    How to like Instagram posts with JavaScript?

  • - + - + -

    Blue Team vs Red Team

    +

    The Best Way to Fool Yourself:Use SMS 2FA

  • diff --git a/_site/authors/shubhendu/index.html b/_site/authors/shubhendu/index.html index 08e5f38b..53eeee54 100644 --- a/_site/authors/shubhendu/index.html +++ b/_site/authors/shubhendu/index.html @@ -1 +1 @@ - Shubhendu

    hugs4bugs

      Shubhendu

      A guy who survived after watching Bear Grylls shows,Now He hunts threats for survial.

      Posts

      + Shubhendu

      hugs4bugs

        Shubhendu

        A guy who survived after watching Bear Grylls shows,Now He hunts threats for survial.

        Posts

        diff --git a/_site/automate-multiple-loginfailure-alerts-response/index.html b/_site/automate-multiple-loginfailure-alerts-response/index.html index f45704e7..f61ad5b4 100644 --- a/_site/automate-multiple-loginfailure-alerts-response/index.html +++ b/_site/automate-multiple-loginfailure-alerts-response/index.html @@ -378,29 +378,29 @@

        See also

      • - + - + -

        Streamline Security :Wazuh in Docker with Kali

        +

        Automate Firebase hosting with Github Actions and Ruby.

      • - + - + -

        Automate Email with Azure Logic App

        +

        The Blue Team.☠️

      • - + - + -

        Computer Networking 101

        +

        Progressive WebApp.

      • diff --git a/_site/automation-with-firebase-and-ruby/index.html b/_site/automation-with-firebase-and-ruby/index.html index 96cce489..8126371b 100644 --- a/_site/automation-with-firebase-and-ruby/index.html +++ b/_site/automation-with-firebase-and-ruby/index.html @@ -481,29 +481,29 @@

        See also

      • - + - + -

        How to integrate Docker Scout with Azure Container Registry

        +

        How to install ThreatMapper in Kali Linux?

      • - + - + -

        Automate Multiple Login failure alerts

        +

        Computer Networking 101

      • - + - + -

        What is Microsoft Defender Threat Intelligence

        +

        Fundamentals of Network Security.☠️

      • diff --git a/_site/azure-networking-101/index.html b/_site/azure-networking-101/index.html index 05a1b71f..04ee8491 100644 --- a/_site/azure-networking-101/index.html +++ b/_site/azure-networking-101/index.html @@ -343,29 +343,29 @@

        See also

      • - + - + -

        Building and Deploying PWA on Azure Cloud.

        +

        Benifits of CI/CD

      • - + - + -

        Anyone can build: node.js+ Cosmos DB in Azure

        +

        Install Kali-Purple tools on top of Normal Kali

      • - + - + -

        How to like Instagram posts with JavaScript?

        +

        Live without passwords

      • diff --git a/_site/benifits-of-CI/index.html b/_site/benifits-of-CI/index.html index 194bb8f4..b7ff3ef7 100644 --- a/_site/benifits-of-CI/index.html +++ b/_site/benifits-of-CI/index.html @@ -412,29 +412,29 @@

        See also

      • - + - + -

        How to onboard your first Microsoft sentinel SIEM tool?

        +

        Automate Firebase hosting with Github Actions and Ruby.

      • - + - + -

        Blue Team vs Red Team

        +

        Streamline Security :Wazuh in Docker with Kali

      • - + - + -

        How to like Instagram posts with JavaScript?

        +

        Azure Networking 101

      • diff --git a/_site/best-linux-cheatsheet-101/index.html b/_site/best-linux-cheatsheet-101/index.html index 105a8d3c..6f6504e3 100644 --- a/_site/best-linux-cheatsheet-101/index.html +++ b/_site/best-linux-cheatsheet-101/index.html @@ -1220,29 +1220,29 @@

        See also

      • - + - + -

        Computer Networking 101

        +

        The Blue Team.☠️

      • - + - + -

        Automate Firebase hosting with Github Actions and Ruby.

        +

        Benifits of CI/CD

      • - + - + -

        The Blue Team.☠️

        +

        Access Management 101.

      • diff --git a/_site/best-way-tofool-yourself-enablinng-sms-based-2FA/index.html b/_site/best-way-tofool-yourself-enablinng-sms-based-2FA/index.html new file mode 100644 index 00000000..706c92dc --- /dev/null +++ b/_site/best-way-tofool-yourself-enablinng-sms-based-2FA/index.html @@ -0,0 +1,856 @@ + + + + + + + + + + + + + + + + + + + + The Best Way to Fool Yourself:Use SMS 2FA | hugs4bugs + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
        + + + + + +

        + + + hugs4bugs + + +

        + + + + + + +
        + +
        + + + +
        +
        + + +
          +
          +
          + + +
          +
          + +

          The Best Way to Fool Yourself:Use SMS 2FA

          +

          Is your 2FA reliable?

          + + + Featured image + + + + + + + + + +

          Okay in this blog I’m not gonna tell you about sim swapping or OTP bypassing or hijacking, I’ll try to keep as realistic I can for all layman people. Before we jump into our main topic let’s clear a few terms like MFA == Multifactor Authenticator , 2FA == Two Factor Authenticator.

          + +

          Now let’s understand the problem statement with example of a person name called “Sivolko”. Meet sivolko, a software developer who relies heavily on various online accounts for both work and personal use. Sivolko is well aware of securing these accounts and has enabled Multifactor Authenticator (MFA) on all of them.Unlikely many common people, sivolko uses SMS-based MFA especially for Email and he often uses Gmail as primary email and another gmail as backup but he haven’t logged in to his backup gmail account since couple of months.

          + +

          However Sivolko is about to discover that this method,while seemingly secure can lead to some significant complications. Let’s breakdown complications :-

          + +

          The Problem with SMS-Based MFA

          + +

          One day sivolko loses his smartphone while communiting to work.Panic sets in as sivolko realises that without the smartphone, he can’t receive OTPs needed to access their accounts. so what could be common issues for him ? Let’s break down them as well

          + +
            +
          1. +

            Lost Phone or SIM Card : Without smartphone sivolko can’t receive the OTP via SMS. Usually gmail sends 6 or 7 numeric OTP which starts with “G”. So what he’ll try , use another method to authenticate option given by Gmail. Now he is supposed to enter his backup email address, which he remembers now it asks to enter password for the back email address as well, Here comes the twist since it was his backup email address he was not using it frequently so obvious reason he don’t remember . Now when he tries to reset password for his backup email it sends OTP to his phone which is already lost ?

            +
          2. +
          3. +

            Forgotten Backup Email Password: Sivolko tries to use the backup email for account recovery but realizes they haven’t accessed it in months and have forgotten the password. This creates a frustrating loop where Sivolko can’t access the OTP sent to the backup email.

            +
          4. +
          5. +

            Circular Problem: With both the primary and backup methods failing, Sivolko is stuck in a loop where they can’t access their accounts. This defeats the purpose of MFA, which is supposed to make accounts more secure, not more complicated.

            +
          6. +
          + +

          Before jumping to advance solution for this situation let’s understand what could be better here, Sivolko might have used different SIM or phone numbers for both primary and backup emails. Another both numbers should not be in same phone or device, incase of lost still another phone or SIM could be easily accessible. Another point is he could have allowed sync in option in all devices where he still get option to “tap to verify” on another logged in devices with same primary or secondary email.

          + +

          So let’s see the standard Industrial grade solutions.

          + +

          Use FIDO Keys or Authenticator Apps?

          + +

          Sivolko starts researching alternative MFA methods and discovers FIDO (Fast Identity Online) keys and authenticator apps. Here’s why these might be better options:

          + +
            +
          1. +

            FIDO Keys: These are physical devices that Shubham can plug into their computer or connect via Bluetooth. They provide a secure way to authenticate without relying on SMS or email. FIDO keys use public key cryptography to verify identity, meaning that even if someone steals Sivolko’s password, they won’t be able to access the account without the physical key.

            +
          2. +
          3. +

            Authenticator Apps: Apps like Google Authenticator or Microsoft Authenticator app which generate OTPs on Sivolo’s phone without needing a cellular connection. Even if Sivolko loses their phone, they can often restore accounts on a new device using backup codes. Authenticator apps are more secure than SMS-based MFA because they don’t rely on a phone number, which can be easily spoofed or intercepted.

            +
          4. +
          + +

          Final Verdict +Sivolko decides to implement some practical solutions to avoid future complications:

          + +
            +
          1. +

            Use Authenticator Apps: Sivolko sets up an authenticator app on their phone and saves the backup codes provided during setup. These codes can be used to restore access if the phone is lost. Authenticator apps are easy to use and provide a higher level of security than SMS-based MFA.

            +
          2. +
          3. +

            Backup Email: Sivolko regularly checks and updates their backup email, ensuring they remember the password or have a secure way to recover it. Sivolko also uses a different email provider for the backup email to reduce the risk of both accounts being compromised at the same time.

            +
          4. +
          5. +

            FIDO Keys: Sivolko invests in a FIDO key for an extra layer of security. These keys are highly secure and can be used across multiple devices. FIDO keys are especially useful for securing high-value accounts, such as email or bank accounts.

            +
          6. +
          7. +

            Multiple Recovery Options: Sivolko uses a combination of recovery options. For example, they set up both an authenticator app and a FIDO key. This way, if one method fails, there’s a backup. Sivolko also sets up recovery options for the recovery options, such as a backup phone number or email address.

            +
          8. +
          + +

          Lemme know if you have been in situtation like sivolko or do you have other solutions to deal with it.

          + + + + + +
          + + + + + +
          + + + +
          + + +
          + + +
          +
          + +
          +
          + Why don't you read something next? +
          + +
          +
          + + +
          + + + +
          +

          Why new session should be created during user authentication?

          +
          +
          + + + + + + + + + + + +
          +

          Share

          + + + + + + + + + + + + + + + +
          + + +
          +
          + + Shubhendu + +

          Author

          +

          + Shubhendu +

          +

          A guy who survived after watching Bear Grylls shows,Now He hunts threats for survial.

          +

          + + + + + + + + + + + + + + + + + + + + + + + + + + +

          +
          +
          + + + + + + + + + + + + + + +
          +

          Comments

          +
          +
          + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + diff --git a/_site/blue-team-vs-red-team-in-cyber-security/index.html b/_site/blue-team-vs-red-team-in-cyber-security/index.html index 2a222b96..8123f73c 100644 --- a/_site/blue-team-vs-red-team-in-cyber-security/index.html +++ b/_site/blue-team-vs-red-team-in-cyber-security/index.html @@ -522,29 +522,29 @@

          See also

        • - + - + -

          Computer Networking 101

          +

          College to Cyber Security Journey

        • - + - + -

          Automate Firebase hosting with Github Actions and Ruby.

          +

          Metasploit Framework vs Metasploit Pro

        • - + - + -

          WAF vs Firewall

          +

          Access Management 101.

        • diff --git a/_site/bulid-and-deploy-MERN-stack-in-Azure-cosmos-DB/index.html b/_site/bulid-and-deploy-MERN-stack-in-Azure-cosmos-DB/index.html index 8f11b636..8389bc69 100644 --- a/_site/bulid-and-deploy-MERN-stack-in-Azure-cosmos-DB/index.html +++ b/_site/bulid-and-deploy-MERN-stack-in-Azure-cosmos-DB/index.html @@ -1190,29 +1190,29 @@

          See also

        • - + - + -

          Kali Linux vs Parrot OS

          +

          Managing and Storing Secrets:Azure Vault.🙆

        • - + - + -

          Fundamentals of Network Security.☠️

          +

          Kali Linux vs Parrot OS

        • - + - + -

          Managing and Storing Secrets:Azure Vault.🙆

          +

          What is Microsoft Defender Threat Intelligence

        • diff --git a/_site/category/automation/index.html b/_site/category/automation/index.html index fed84cf3..d16b0629 100644 --- a/_site/category/automation/index.html +++ b/_site/category/automation/index.html @@ -322,6 +322,8 @@

          /Automation

          + + diff --git a/_site/category/azure/index.html b/_site/category/azure/index.html index 18fa8af0..24044211 100644 --- a/_site/category/azure/index.html +++ b/_site/category/azure/index.html @@ -295,6 +295,8 @@

          /Azure

          + +
          diff --git a/_site/category/code/index.html b/_site/category/code/index.html index 1c9abee7..f86e3b47 100644 --- a/_site/category/code/index.html +++ b/_site/category/code/index.html @@ -375,6 +375,8 @@

          /Code

          + + diff --git a/_site/category/css/index.html b/_site/category/css/index.html index 5873b9eb..6ad300d3 100644 --- a/_site/category/css/index.html +++ b/_site/category/css/index.html @@ -375,6 +375,8 @@

          /CSS

          + + diff --git a/_site/category/devops/index.html b/_site/category/devops/index.html index 0cf7e6ca..f9ff354a 100644 --- a/_site/category/devops/index.html +++ b/_site/category/devops/index.html @@ -368,6 +368,8 @@

          /Devops

          + + diff --git a/_site/category/docker/index.html b/_site/category/docker/index.html index 52e50a87..09a7a695 100644 --- a/_site/category/docker/index.html +++ b/_site/category/docker/index.html @@ -299,6 +299,8 @@

          /Docker

          + +
          diff --git a/_site/category/linux/index.html b/_site/category/linux/index.html index 6e42878f..81dbad71 100644 --- a/_site/category/linux/index.html +++ b/_site/category/linux/index.html @@ -328,6 +328,8 @@

          /Linux

          + + diff --git a/_site/category/music/index.html b/_site/category/music/index.html index f65f5a30..9e9ece47 100644 --- a/_site/category/music/index.html +++ b/_site/category/music/index.html @@ -375,6 +375,8 @@

          /Music

          + + diff --git a/_site/category/networking/index.html b/_site/category/networking/index.html index 8d59845c..6bc679a1 100644 --- a/_site/category/networking/index.html +++ b/_site/category/networking/index.html @@ -356,6 +356,8 @@

          /Networking

          + + diff --git a/_site/category/security/index.html b/_site/category/security/index.html index 3bb04d2d..8c0767b6 100644 --- a/_site/category/security/index.html +++ b/_site/category/security/index.html @@ -297,6 +297,8 @@

          /Security

          + +
          diff --git a/_site/category/tips/index.html b/_site/category/tips/index.html index 92bc4813..eb1cfd88 100644 --- a/_site/category/tips/index.html +++ b/_site/category/tips/index.html @@ -375,6 +375,8 @@

          /Tips

          + + diff --git a/_site/category/travel/index.html b/_site/category/travel/index.html index b7421ce9..9695de4f 100644 --- a/_site/category/travel/index.html +++ b/_site/category/travel/index.html @@ -334,6 +334,8 @@

          /Cloud

          + + diff --git a/_site/category/tutorial/index.html b/_site/category/tutorial/index.html index 09c10928..4e61faa3 100644 --- a/_site/category/tutorial/index.html +++ b/_site/category/tutorial/index.html @@ -375,6 +375,8 @@

          /Tutorial

          + + diff --git a/_site/category/webapps/index.html b/_site/category/webapps/index.html index a4952b6b..e138777c 100644 --- a/_site/category/webapps/index.html +++ b/_site/category/webapps/index.html @@ -342,6 +342,8 @@

          /Webapps

          + + diff --git a/_site/cloud-native-CNAPP-tool-Microsoft-defender-for-cloud-101/index.html b/_site/cloud-native-CNAPP-tool-Microsoft-defender-for-cloud-101/index.html index 1583fca4..b975dcad 100644 --- a/_site/cloud-native-CNAPP-tool-Microsoft-defender-for-cloud-101/index.html +++ b/_site/cloud-native-CNAPP-tool-Microsoft-defender-for-cloud-101/index.html @@ -581,29 +581,29 @@

          See also

        • - + - + -

          Automate Email with Azure Logic App

          +

          Wazuh's Big Move:From Elasticsearch to OpenSearch

        • - + - + -

          Protection against Security threat on Azure.☠️

          +

          Linux Cheat Sheet 101

        • - + - + -

          How to create & Manage users and Groups within Azure AD.

          +

          Why new session should be created during user authentication?

        • diff --git a/_site/college-to-cyber-security/index.html b/_site/college-to-cyber-security/index.html index 4ff490b4..32ac4545 100644 --- a/_site/college-to-cyber-security/index.html +++ b/_site/college-to-cyber-security/index.html @@ -402,29 +402,29 @@

          See also

        • - + - + -

          Wazuh's Big Move:From Elasticsearch to OpenSearch

          +

          Automate Multiple Login failure alerts

        • - + - + -

          How to install ThreatMapper in Kali Linux?

          +

          Install Kali-Purple tools on top of Normal Kali

        • - + - + -

          Benifits of CI/CD

          +

          Building and Deploying PWA on Azure Cloud.

        • diff --git a/_site/computer-networking-basics/index.html b/_site/computer-networking-basics/index.html index d4f3de64..5296cd08 100644 --- a/_site/computer-networking-basics/index.html +++ b/_site/computer-networking-basics/index.html @@ -1108,29 +1108,29 @@

          See also

        • - + - + -

          Do you use ls -lrt?

          +

          Fundamentals of Network Security.☠️

        • - + - + -

          Demystifying Log Analytics vs Log Analytics Workspace in MS Sentinel

          +

          How to install ThreatMapper in Kali Linux?

        • - + - + -

          WAF vs Firewall

          +

          Live without passwords

        • diff --git a/_site/demystifying-loganalytics-vs-log-analytics-workspace-in-MS-Sentinel/index.html b/_site/demystifying-loganalytics-vs-log-analytics-workspace-in-MS-Sentinel/index.html index 1379f40a..c1ea9663 100644 --- a/_site/demystifying-loganalytics-vs-log-analytics-workspace-in-MS-Sentinel/index.html +++ b/_site/demystifying-loganalytics-vs-log-analytics-workspace-in-MS-Sentinel/index.html @@ -394,29 +394,29 @@

          See also

        • - + - + -

          Anyone can build: node.js+ Cosmos DB in Azure

          +

          Automation with Jenkins and GitHub

        • - + - + -

          Computer Networking 101

          +

          Anyone can build: node.js+ Cosmos DB in Azure

        • - + - + -

          Automate Twitter via github Actions.

          +

          How to create & Manage users and Groups within Azure AD.

        • @@ -448,13 +448,13 @@

          Automate Twitter via github Actions.

          - +
          - +
          -

          Tools that SOC/Security Analyst must know

          +

          The Best Way to Fool Yourself:Use SMS 2FA

          diff --git a/_site/difference-between-WAF-and-IPS/index.html b/_site/difference-between-WAF-and-IPS/index.html index 8cd69636..5401de75 100644 --- a/_site/difference-between-WAF-and-IPS/index.html +++ b/_site/difference-between-WAF-and-IPS/index.html @@ -435,29 +435,29 @@

          See also

        • - + - + -

          Managing and Storing Secrets:Azure Vault.🙆

          +

          Tools that SOC/Security Analyst must know

        • - + - + -

          What is Microsoft Defender Threat Intelligence

          +

          How to install ThreatMapper in Kali Linux?

        • - + - + -

          Do you use ls -lrt?

          +

          Install Kali-Purple tools on top of Normal Kali

        • diff --git a/_site/feed.xml b/_site/feed.xml index 6bb4b446..fe68d225 100644 --- a/_site/feed.xml +++ b/_site/feed.xml @@ -5,10 +5,22 @@ hugs4bugs is an open source blog written by shubhendu shubham on various cloud and technologies to for community help. https://hugs4bugs.me/ - Thu, 02 Jan 2025 06:58:22 +0000 - Thu, 02 Jan 2025 06:58:22 +0000 + Sat, 04 Jan 2025 14:51:15 +0000 + Sat, 04 Jan 2025 14:51:15 +0000 Jekyll v3.9.3 + + The Best Way to Fool Yourself:Use SMS 2FA + <p>Okay in this blog I’m not gonna tell you about sim swapping or OTP bypassing or hijacking, I’ll try to keep as realistic I can for all layman people. Before we jump into our main topic let’s clear a few terms like MFA == Multifactor Authenticator , 2FA == Two Factor Authenticator.</p> <p>Now let’s understand the problem statement with example of a person name called “Sivolko”. Meet sivolko, a software developer who relies heavily on various online accounts for both work and personal use. Sivolko is well aware of securing these accounts and has enabled Multifactor Authenticator (MFA) on all... + Sat, 04 Jan 2025 00:00:00 +0000 + https://hugs4bugs.me/best-way-tofool-yourself-enablinng-sms-based-2FA/ + https://hugs4bugs.me/best-way-tofool-yourself-enablinng-sms-based-2FA/ + + Cyber Security + + Identity & Access + + Demystifying Log Analytics vs Log Analytics Workspace in MS Sentinel <p><strong>Problem Statement</strong></p> <p>I have seen many professionals,especially those new to Azure, often get confused between Log Analytics and Log Analytics Workspace during Microsoft Sentinel deployment. This confusion can lead to inefficient setups, increased costs, and suboptimal security postures. Being a security SME it’s crucial to share my personal and hands on expertise to avoid future confusions.Let’s break down these concepts to eliminate any ambiguity.</p> <p><strong>Understanding Log Analytics</strong></p> <p>Log Analytics is a service within Azure Monitor that collects and analyzes log data from various sources. Think of it as the engine that powers your log data analysis. It helps you gain... @@ -513,19 +525,5 @@ webapps - - The Blue Team.☠️ - <p>Before I start telling fancy stories of CyberSecurity, let me explain a few common used terms,so that whenever I use these words,one have clear picturisation of the terminology.Too many times in the many years, I’ve been in IT, I have seen people forget these basics terms.So, let’s start…..</p> <p><strong>Fundamental Networking and Security Tools</strong></p> <ol> <li>Ping</li> <li>IPConfig</li> <li>NSLookUp</li> <li>Tracert</li> <li>NetStat</li> <li>Putty</li> </ol> <p><strong>Ping</strong></p> <p>Ping = Packet InterNet Groper</p> <p>Ping is a networking utility,used to test whether a host is <em>alive</em> on an Internet Protocol (IP) network.A host could be a computer or other device that is connected to a network.Ping measure... - Mon, 02 Aug 2021 23:04:08 +0000 - https://hugs4bugs.me/the-blue-team-protecting-you/ - https://hugs4bugs.me/the-blue-team-protecting-you/ - - networking - - security - - security - - diff --git a/_site/how-to-automate-tweets-via-github-actions/index.html b/_site/how-to-automate-tweets-via-github-actions/index.html index 4dcf8d35..6b64bb21 100644 --- a/_site/how-to-automate-tweets-via-github-actions/index.html +++ b/_site/how-to-automate-tweets-via-github-actions/index.html @@ -438,20 +438,20 @@

          Access Management 101.

        • - + - + -

          Docker 101

          +

          WAF vs Firewall

        • - + - + -

          How to create & Manage users and Groups within Azure AD.

          +

          Automate Firebase hosting with Github Actions and Ruby.

        • diff --git a/_site/how-to-install-kali-purple-SOC-tools-on-top-of-existing-kali-machine/index.html b/_site/how-to-install-kali-purple-SOC-tools-on-top-of-existing-kali-machine/index.html index 23443daf..76fb63ff 100644 --- a/_site/how-to-install-kali-purple-SOC-tools-on-top-of-existing-kali-machine/index.html +++ b/_site/how-to-install-kali-purple-SOC-tools-on-top-of-existing-kali-machine/index.html @@ -407,29 +407,29 @@

          See also

        • - + - + -

          Do you use ls -lrt?

          +

          The Best Way to Fool Yourself:Use SMS 2FA

        • - + - + -

          Metasploit Framework vs Metasploit Pro

          +

          Computer Networking 101

        • - + - + -

          How to onboard your first Microsoft sentinel SIEM tool?

          +

          Demystifying Log Analytics vs Log Analytics Workspace in MS Sentinel

        • diff --git a/_site/how-to-integrate-docker-scout-with-azure-container-registry/index.html b/_site/how-to-integrate-docker-scout-with-azure-container-registry/index.html index ffd5f4ec..8101ed2e 100644 --- a/_site/how-to-integrate-docker-scout-with-azure-container-registry/index.html +++ b/_site/how-to-integrate-docker-scout-with-azure-container-registry/index.html @@ -471,29 +471,29 @@

          See also

        • - + - + -

          How to install ThreatMapper in Kali Linux?

          +

          Docker 101

        • - + - + -

          Metasploit Framework vs Metasploit Pro

          +

          Microsoft Defender for Cloud 101

        • - + - + -

          Access Management 101.

          +

          College to Cyber Security Journey

        • diff --git a/_site/how-to-like-instagram-post-with-javascript/index.html b/_site/how-to-like-instagram-post-with-javascript/index.html index 89905c70..ed940093 100644 --- a/_site/how-to-like-instagram-post-with-javascript/index.html +++ b/_site/how-to-like-instagram-post-with-javascript/index.html @@ -395,29 +395,29 @@

          See also

        • - + - + -

          WAF vs IPS

          +

          The Blue Team.☠️

        • - + - + -

          Protection against Security threat on Azure.☠️

          +

          How to integrate Docker Scout with Azure Container Registry

        • - + - + -

          College to Cyber Security Journey

          +

          Linux Cheat Sheet 101

        • diff --git a/_site/how-to-manage-azure-active-directory-objects/index.html b/_site/how-to-manage-azure-active-directory-objects/index.html index 7172e85e..8cb372f7 100644 --- a/_site/how-to-manage-azure-active-directory-objects/index.html +++ b/_site/how-to-manage-azure-active-directory-objects/index.html @@ -562,29 +562,29 @@

          See also

        • - + - + -

          Fundamentals of Network Security.☠️

          +

          Do you use ls -lrt?

        • - + - + -

          Automate Email with Azure Logic App

          +

          Linux Cheat Sheet 101

        • - + - + -

          How to like Instagram posts with JavaScript?

          +

          How to integrate Docker Scout with Azure Container Registry

        • diff --git a/_site/index.html b/_site/index.html index 164937f4..0203e6bc 100644 --- a/_site/index.html +++ b/_site/index.html @@ -1 +1 @@ - hugs4bugs

          hugs4bugs

            Demystifying Log Analytics vs Log Analytics Workspace in MS Sentinel

            No More Confusions!

            + hugs4bugs

            hugs4bugs

              The Best Way to Fool Yourself:Use SMS 2FA

              Is your 2FA reliable?

              diff --git a/_site/kali-linux-vs-parrot-linux/index.html b/_site/kali-linux-vs-parrot-linux/index.html index cb9fba12..358cff3e 100644 --- a/_site/kali-linux-vs-parrot-linux/index.html +++ b/_site/kali-linux-vs-parrot-linux/index.html @@ -444,29 +444,29 @@

              See also

            • - + - + -

              Anyone can build: node.js+ Cosmos DB in Azure

              +

              Blue Team vs Red Team

            • - + - + -

              Automation with Jenkins and GitHub

              +

              Progressive WebApp.

            • - + - + -

              Azure Networking 101

              +

              Anyone can build: node.js+ Cosmos DB in Azure

            • diff --git a/_site/living-without-passwords/index.html b/_site/living-without-passwords/index.html index 5385a5db..16ab6c20 100644 --- a/_site/living-without-passwords/index.html +++ b/_site/living-without-passwords/index.html @@ -385,29 +385,29 @@

              See also

            • - + - + -

              Progressive WebApp.

              +

              Anyone can build: node.js+ Cosmos DB in Azure

            • - + - + -

              How to create & Manage users and Groups within Azure AD.

              +

              WAF vs Firewall

            • - + - + -

              Azure Networking 101

              +

              Automate Twitter via github Actions.

            • diff --git a/_site/metasploitFramework-vs-metasploit-pro/index.html b/_site/metasploitFramework-vs-metasploit-pro/index.html index fecb9eb2..776453e0 100644 --- a/_site/metasploitFramework-vs-metasploit-pro/index.html +++ b/_site/metasploitFramework-vs-metasploit-pro/index.html @@ -359,29 +359,29 @@

              See also

            • - + - + -

              Streamline Security :Wazuh in Docker with Kali

              +

              Progressive WebApp.

            • - + - + -

              Automate Twitter via github Actions.

              +

              How to like Instagram posts with JavaScript?

            • - + - + -

              Kali Linux vs Parrot OS

              +

              WAF vs IPS

            • diff --git a/_site/search.json b/_site/search.json index dac83e27..0b11056c 100644 --- a/_site/search.json +++ b/_site/search.json @@ -2,6 +2,14 @@ + { + "title" : "The Best Way to Fool Yourself:Use SMS 2FA", + "tags" : "Cyber Security", + "categories" : "Identity & Access", + "url" : "/best-way-tofool-yourself-enablinng-sms-based-2FA/", + "date" : "01/04/2025" + } , + { "title" : "Demystifying Log Analytics vs Log Analytics Workspace in MS Sentinel", "tags" : "Cyber Security, SIEM, sentinel, and soc", diff --git a/_site/send-email-with-Azure-logic-app/index.html b/_site/send-email-with-Azure-logic-app/index.html index 36f445e9..64d08bea 100644 --- a/_site/send-email-with-Azure-logic-app/index.html +++ b/_site/send-email-with-Azure-logic-app/index.html @@ -605,29 +605,29 @@

              See also

            • - + - + -

              The Blue Team.☠️

              +

              The Best Way to Fool Yourself:Use SMS 2FA

            • - + - + -

              Blue Team vs Red Team

              +

              How to like Instagram posts with JavaScript?

            • - + - + -

              Computer Networking 101

              +

              The Blue Team.☠️

            • diff --git a/_site/sitemap.xml b/_site/sitemap.xml index a53213cc..22292390 100644 --- a/_site/sitemap.xml +++ b/_site/sitemap.xml @@ -218,6 +218,13 @@ + + https://hugs4bugs.me/best-way-tofool-yourself-enablinng-sms-based-2FA/ + weekly + 0.8 + 2025-01-04 + + https://hugs4bugs.me/demystifying-loganalytics-vs-log-analytics-workspace-in-MS-Sentinel/ weekly diff --git a/_site/storing-and-managing-secrets-using-azure-vault/index.html b/_site/storing-and-managing-secrets-using-azure-vault/index.html index c57c50a5..cab0e325 100644 --- a/_site/storing-and-managing-secrets-using-azure-vault/index.html +++ b/_site/storing-and-managing-secrets-using-azure-vault/index.html @@ -605,29 +605,29 @@

              See also

            • - + - + -

              Blue Team vs Red Team

              +

              Linux Cheat Sheet 101

            • - + - + -

              How to install JENKINS on Linux ?

              +

              Demystifying Log Analytics vs Log Analytics Workspace in MS Sentinel

            • - + - + -

              How to create & Manage users and Groups within Azure AD.

              +

              Live without passwords

            • diff --git a/_site/streamline-security-wazuh-in-docker/index.html b/_site/streamline-security-wazuh-in-docker/index.html index 257e2978..55ecc5f4 100644 --- a/_site/streamline-security-wazuh-in-docker/index.html +++ b/_site/streamline-security-wazuh-in-docker/index.html @@ -460,29 +460,29 @@

              See also

            • - + - + -

              How to install ThreatMapper in Kali Linux?

              +

              Automate Twitter via github Actions.

            • - + - + -

              Blue Team vs Red Team

              +

              Metasploit Framework vs Metasploit Pro

            • - + - + -

              Building and Deploying PWA on Azure Cloud.

              +

              Anyone can build: node.js+ Cosmos DB in Azure

            • diff --git a/_site/tags/index.html b/_site/tags/index.html index 994d492f..66261edb 100644 --- a/_site/tags/index.html +++ b/_site/tags/index.html @@ -1 +1 @@ - hugs4bugs

              hugs4bugs

                #devops
                #jenkins
                #linux
                #automation
                #instagram
                #javascript
                #github
                #CI/CD
                #docker
                #system Admin
                #azure
                #microsoft
                #networking
                #security
                #WebApps
                #PWA
                #Progressive WebApp
                #Automation
                #GitHub Actions
                #Access Management
                #Vulnerability
                #Cyber Security
                #node.js
                #COSMOS DB
                #cloud
                #hacking
                #offensive security
                #troubleshooter Club
                #search engine
                #webApps
                #jekyll
                #developer
                #active directory
                #blob storage
                #logic app
                #Defender
                #Threat Intelligence
                #MDC
                #Microsoft Defender for cloud
                #Microsoft Sentinel
                #Tools
                #Container
                #BlueTeam
                #SOC
                #SAST
                #Pentest
                #SIEM
                #blueteam
                #soc
                #sentinel
                + hugs4bugs

                hugs4bugs

                  #devops
                  #jenkins
                  #linux
                  #automation
                  #instagram
                  #javascript
                  #github
                  #CI/CD
                  #docker
                  #system Admin
                  #azure
                  #microsoft
                  #networking
                  #security
                  #WebApps
                  #PWA
                  #Progressive WebApp
                  #Automation
                  #GitHub Actions
                  #Access Management
                  #Vulnerability
                  #Cyber Security
                  #node.js
                  #COSMOS DB
                  #cloud
                  #hacking
                  #offensive security
                  #troubleshooter Club
                  #search engine
                  #webApps
                  #jekyll
                  #developer
                  #active directory
                  #blob storage
                  #logic app
                  #Defender
                  #Threat Intelligence
                  #MDC
                  #Microsoft Defender for cloud
                  #Microsoft Sentinel
                  #Tools
                  #Container
                  #BlueTeam
                  #SOC
                  #SAST
                  #Pentest
                  #SIEM
                  #blueteam
                  #soc
                  #sentinel
                  diff --git a/_site/the-blue-team-protecting-you/index.html b/_site/the-blue-team-protecting-you/index.html index 118d8bd3..f400e05f 100644 --- a/_site/the-blue-team-protecting-you/index.html +++ b/_site/the-blue-team-protecting-you/index.html @@ -540,29 +540,29 @@

                  See also

                • - + - + -

                  Linux Cheat Sheet 101

                  +

                  Kali Linux vs Parrot OS

                • - + - + -

                  Progressive WebApp.

                  +

                  What is chatGpt? How to use it?

                • - + - + -

                  Azure Networking 101

                  +

                  Do you use ls -lrt?

                • diff --git a/_site/tools-that-SOC-security-analys-should-know/index.html b/_site/tools-that-SOC-security-analys-should-know/index.html index b7933088..63656f42 100644 --- a/_site/tools-that-SOC-security-analys-should-know/index.html +++ b/_site/tools-that-SOC-security-analys-should-know/index.html @@ -540,29 +540,29 @@

                  See also

                • - + - + -

                  Do you use ls -lrt?

                  +

                  Computer Networking 101

                • - + - + -

                  What is Microsoft Defender Threat Intelligence

                  +

                  Why new session should be created during user authentication?

                • - + - + -

                  College to Cyber Security Journey

                  +

                  Microsoft Defender for Cloud 101

                • diff --git a/_site/useful-cybersecurity-search-engines/index.html b/_site/useful-cybersecurity-search-engines/index.html index f74ab566..0623941f 100644 --- a/_site/useful-cybersecurity-search-engines/index.html +++ b/_site/useful-cybersecurity-search-engines/index.html @@ -384,29 +384,29 @@

                  See also

                • - + - + -

                  Progressive WebApp.

                  +

                  Managing and Storing Secrets:Azure Vault.🙆

                • - + - + -

                  Automate Firebase hosting with Github Actions and Ruby.

                  +

                  How to install JENKINS on Linux ?

                • - + - + -

                  WAF vs Firewall

                  +

                  Blue Team vs Red Team

                • diff --git a/_site/waf-vs-firewall/index.html b/_site/waf-vs-firewall/index.html index 5a37ada7..33019449 100644 --- a/_site/waf-vs-firewall/index.html +++ b/_site/waf-vs-firewall/index.html @@ -454,20 +454,20 @@

                  See also

                • - + - + -

                  Managing and Storing Secrets:Azure Vault.🙆

                  +

                  Tools that SOC/Security Analyst must know

                • - + - + -

                  Linux Cheat Sheet 101

                  +

                  Do you use ls -lrt?

                • diff --git a/_site/wazuh's-big-move-from-elasticsearch-to-opensearch/index.html b/_site/wazuh's-big-move-from-elasticsearch-to-opensearch/index.html index 8026b9a7..071c5514 100644 --- a/_site/wazuh's-big-move-from-elasticsearch-to-opensearch/index.html +++ b/_site/wazuh's-big-move-from-elasticsearch-to-opensearch/index.html @@ -415,29 +415,29 @@

                  See also

                • - + - + -

                  Docker 101

                  +

                  Blue Team vs Red Team

                • - + - + -

                  How to like Instagram posts with JavaScript?

                  +

                  Linux Cheat Sheet 101

                • - + - + -

                  Building and Deploying PWA on Azure Cloud.

                  +

                  Why new session should be created during user authentication?

                • diff --git a/_site/what-is-chat-gpt/index.html b/_site/what-is-chat-gpt/index.html index 48cd1d10..b780dfd5 100644 --- a/_site/what-is-chat-gpt/index.html +++ b/_site/what-is-chat-gpt/index.html @@ -391,29 +391,29 @@

                  See also

                • - + - + -

                  Install Kali-Purple tools on top of Normal Kali

                  +

                  College to Cyber Security Journey

                • - + - + -

                  How to create & Manage users and Groups within Azure AD.

                  +

                  How to install JENKINS on Linux ?

                • - + - + -

                  Linux Cheat Sheet 101

                  +

                  WAF vs IPS

                • diff --git a/_site/what-is-difference-between-ls-and-ls-lrt-command/index.html b/_site/what-is-difference-between-ls-and-ls-lrt-command/index.html index 605c28ce..cfc1ed7c 100644 --- a/_site/what-is-difference-between-ls-and-ls-lrt-command/index.html +++ b/_site/what-is-difference-between-ls-and-ls-lrt-command/index.html @@ -367,29 +367,29 @@

                  See also

                • - + - + -

                  Automate Firebase hosting with Github Actions and Ruby.

                  +

                  Automate Email with Azure Logic App

                • - + - + -

                  Protection against Security threat on Azure.☠️

                  +

                  Anyone can build: node.js+ Cosmos DB in Azure

                • - + - + -

                  Blue Team vs Red Team

                  +

                  WAF vs IPS

                • diff --git a/_site/why-new-session-should-be-created-during-user-authentication/index.html b/_site/why-new-session-should-be-created-during-user-authentication/index.html index 2d8ab363..17c9bef1 100644 --- a/_site/why-new-session-should-be-created-during-user-authentication/index.html +++ b/_site/why-new-session-should-be-created-during-user-authentication/index.html @@ -463,29 +463,29 @@

                  See also

                • - + - + -

                  Demystifying Log Analytics vs Log Analytics Workspace in MS Sentinel

                  +

                  Do you use ls -lrt?

                • - + - + -

                  How to install JENKINS on Linux ?

                  +

                  Microsoft Defender for Cloud 101

                • - + - + -

                  Automate Twitter via github Actions.

                  +

                  Progressive WebApp.