Newsletter Subject

A Century of _secpro issues!

From

packtpub.com

Email Address

austinm@packtpub.com

Sent On

Fri, May 12, 2023 01:18 PM

Email Preheader Text

A bumper issue, rammed with articles, tutorials, and throwbacks from over the last two years! SecPro

A bumper issue, rammed with articles, tutorials, and throwbacks from over the last two years! [View this email in your browser]( SecPro #100: A Century of secpro Issues! Hello! Here we are with the 100th issue of the _secpro! Not only has the time flown, but the changes we've seen over the past two years have been massive. Our readers and authors have turned this newsletter into a reliable weekly issue that covers the things you need. As a thank you, we've decided to run a little giveaway... If you want to win access to a free Packt eBook, check out our survey below. We're giving away 50 books of your choice for 50 people who respond to the survey below. We'll be selecting the winners at random, so don't worry about answering late! The survey will close at midnight on May 19th 2023 (BST), so make sure to put your name in the hat! In other news, we're also covering the rest of Indrajeet's advice on GPT for cybersecurity, a quick look at what MITRE D3FEND is, an ethical hacking tutorial, and a few throwbacks to the highlights over the last two years. Sound good? Jump on in! Cheers! [Austin Miller]( Editor in Chief This week's highlights: - [GPT-4 for Security Professionals]( - [What is D3FEND?]( - [Learn Ethical Hacking from Scratch]( - [Learn Cybersecurity with Ian Neil]( - [This Week's Survey]( And with that - on with the show! [WANT A FREE EBOOK? CLICK HERE!]( [Studying for Sec+? Get 20% off Ian Neil's CompTIA Security+ guide!]( [GET STARTED WITH SEC+!]( This Week's Editorial Articles [GPT-4 for Security Professionals]( GPT-4 and ChatGPT simplify numerous tasks in offensive security which are invaluable to security professionals. [Introducing MITRE D3FEND]( What is D3FEND? How do I use it? Is it just the ATT&CK framework inverted? Jump in here to find out... Cybersecurity Fundamentals [Learn Ethical Hacking from Scratch]( We've changed course! This time, we're taking a quick look at [Learn Ethical Hacking from Scratch](. Make sure to check out the book to set up your systems for the lessons, then dive in with the _secpro! [LIKE WHAT YOU SEE? CLICK HERE]( [Basic web cracking]( Through the previous section, we know that to crack a WEP key, all we have to do is sniff packets from the target network and gather as many IVs as possible. Once we have done that, aircrack-ng will be able to use statistical attacks to determine the key stream and the WEP key for the target network. Obviously, when we have more than two packets, the method is going to work better, and our chances of breaking the key will be higher—we're going to try to gather as many IVs as possible. Let's look at the most basic case of cracking a WEP key. Wi-Fi card must be in monitor mode, and the first thing we're going to try to do is see all of the networks that are within our Wi-Fi range; then, we're going to target one of those networks. We're going to run airodump-ng wlan0, very basic command, where wlan0 stands for the interface. Following will be displayed as an output: The first network that has come up is Test; this is the network that we're going to perform our attacks on. We're going to launch airodump against Test network by using the following command: airodump-ng --bssid 54:B8:0A:9E:54:2D --channel 11 --write basic-test-ap wlan0 Here, we enter the --bssid and launch an airodump against Test AP. We include the --channel, number 11, and we add --write to store all of the packets that we capture into a file, which is basic-test-ap. As we run the preceding command, we will be able to see the output in the following screenshot, the target network that we have as the data we gathered it is quite a busy one, also the data and the frames are going: It is a busy network; the following is the section where we can see the clients: All we have to do now is launch aircrack-ng, which is part of the aircrack suite, against the file that airodump has created for us. We can launch aircrack against it even if we didn't stop airodump; it will keep reading the file, and it will read the new packets that airodump is capturing. The command to use is as follows: aircrack-ng basic-test-ap-01.cap When we use aircrack-ng, we will put in the filename basic-test-ap-01.cap. While the file is still being created, getting larger and larger with the inclusion of new packets, we can run aircrack-ng, and it will keep getting updated, eventually giving us the password we need for cracking. If aircrack fails to determine the key, aircrack waits until it reaches 5,000 IVs, and then tries again. The number of IVs actually depends on the type of WEP encryption. There are two types of WEP encryption: 128-bit and 64-bit. The only difference is the length of the key; obviously, 64-bit requires a lower number of IVs than 128-bit. Remember that when we discussed aircrack, we indicated that the more packets we get without unique IVs, the higher our chances of cracking the WEP key are. Now, we basically wait until aircrack can successfully crack the WEP key. Once it decrypts the key, we can press Ctrl + C. As we can see in the following screenshot, aircrack has successfully managed to get the key within data packets; this is because the target AP uses a 64-bit key: As you can see, our connection has been established; we successfully recovered the WEP key from the target network. We can go ahead and confirm by pinging Google. Want to get a step-by-step guide of how to connect to a wireless adapter? [Click the link and check out the book]( It's free! Who Wants a Throwback? As we have now cycled through 100 issues, we thought it would be a good idea to have a look at the articles we've released in the past. Click below to access our favorites! Picks from the Archive: - [Securing Kubernetes]( - [Log4j and Defender for Endpoint]( - [Linux Security Hardening]( - [Brute Forcing Full Drive Encryption]( - [ChatGPT - Already a Security Risk?]( - [YARA Rules for Beginners]( Have You Tried...? Learning how to run forensic analysis on Linux is easier with a few tools specifically for running forensic analysis on Linux. Check out this week's selection and tell us your favorite one in the survey above! - [ashemery/LinuxForensics]( - Need a big collection to start studying hard? Look no further. - [aquasecurity/tracee]( - A Linux runtime security and forensics tool, using eBPF. - [intezer/linux-explorer]( - An easy-to-use live forensics toolbox for Linux endpoints. - [hard2bit/afbd]( - Need to pentest against teams with strong forensic capabilities? Test out this anti-forensics block device driver for Linux. - [M00NLIG7/ChopChopGo]( - Speed up your Linux forensics with this speedy artifact hunter. - [PacktPublishing/Digital-Forensics-with-Kali-Linux-Second-Edition]( - A book from [Packt]( all about how to run digital forensics with Kali. [FORWARDED THIS EMAIL? SIGN UP HERE]( [NOT FOR YOU? UNSUBSCRIBE HERE]( Copyright © 2023 Packt Publishing, All rights reserved. As a GDPR-compliant company, we want you to know why you’re getting this email. The _secpro team, as a part of Packt Publishing, believes that you have a legitimate interest in our newsletter and the products associated with it. Our research shows that you opted-in for communication with Packt Publishing in the past and we think that your previous interest warrants our appropriate communication. If you do not feel that you should have received this or are no longer interested in _secpro, you can opt out of our emails using the unsubscribe link below. Our mailing address is: Packt Publishing Livery Place, 35 Livery StreetBirmingham, West Midlands, B3 2PB United Kingdom [Add us to your address book]( Want to change how you receive these emails? You can [update your preferences]( or [unsubscribe from this list](.

Marketing emails from packtpub.com

View More
Sent On

07/11/2024

Sent On

26/10/2024

Sent On

17/10/2024

Sent On

09/10/2024

Sent On

03/10/2024

Sent On

25/09/2024

Email Content Statistics

Subscribe Now

Subject Line Length

Data shows that subject lines with 6 to 10 words generated 21 percent higher open rate.

Subscribe Now

Average in this category

Subscribe Now

Number of Words

The more words in the content, the more time the user will need to spend reading. Get straight to the point with catchy short phrases and interesting photos and graphics.

Subscribe Now

Average in this category

Subscribe Now

Number of Images

More images or large images might cause the email to load slower. Aim for a balance of words and images.

Subscribe Now

Average in this category

Subscribe Now

Time to Read

Longer reading time requires more attention and patience from users. Aim for short phrases and catchy keywords.

Subscribe Now

Average in this category

Subscribe Now

Predicted open rate

Subscribe Now

Spam Score

Spam score is determined by a large number of checks performed on the content of the email. For the best delivery results, it is advised to lower your spam score as much as possible.

Subscribe Now

Flesch reading score

Flesch reading score measures how complex a text is. The lower the score, the more difficult the text is to read. The Flesch readability score uses the average length of your sentences (measured by the number of words) and the average number of syllables per word in an equation to calculate the reading ease. Text with a very high Flesch reading ease score (about 100) is straightforward and easy to read, with short sentences and no words of more than two syllables. Usually, a reading ease score of 60-70 is considered acceptable/normal for web copy.

Subscribe Now

Technologies

What powers this email? Every email we receive is parsed to determine the sending ESP and any additional email technologies used.

Subscribe Now

Email Size (not include images)

Font Used

No. Font Name
Subscribe Now

Copyright © 2019–2025 SimilarMail.