The Hidden Power of Wireshark Filters: A Guide for Cybersecurity Pros

The Hidden Power of Wireshark Filters: A Guide for Cybersecurity Pros

Alright, let’s talk Wireshark. You know, that tool you’ve probably seen a hundred times, with its daunting interface and information overload? While it might look like a network geek’s dream (and, let’s be honest, it kind of is), Wireshark is way more than just a pretty interface. It’s a robust tool for digging deep into network traffic, identifying vulnerabilities, and doing good ol’ troubleshooting. Today, I’m zeroing in on the unsung hero of Wireshark: filters.

The Siren Call of Filters: Why Should You Care?

So you’re drowning in an ocean of data packets. Feels like a mess, right? One minute you’re casually observing network traffic, and the next, you’re lost in a labyrinth of packets. That’s precisely when filters become your guiding star. Think of it as sifting for gold—filters help you isolate the nuggets of information that matter most, especially when you’re elbows deep in a cybersecurity investigation.

The Basics: IP Address Filtering

Old-School Manual Entry

Let’s set the stage. You’re in the middle of a penetration test and a certain IP address—let’s say 5.1.81.68—pops up like a sore thumb. You could go the classic route and manually type ip.addr == 5.1.81.68 into Wireshark’s filter bar. Simple, but if you’ve got a laundry list of IPs to track, manual entry gets old fast.

Sleek Drag-and-Drop

Here’s another scenario. While you’re rummaging through the packet details, an interesting IP stands out. Instead of scribbling it down, you can just drag and drop it into the filter field. It’s as easy as drag, drop, and voila, there’s your filter! A real timesaver, especially when you’ve got more intriguing problems to solve.

Syntax Savvy

Wireshark does throw us a lifeline in the form of a cheat sheet. You can specify filters like ip.src for source addresses and ip.dst for destinations. This kind of precision is a game-changer when you’re eyeballing traffic for a specific target.

Real-World Wisdom: Use Cases and Tips

New to the Game?

If you’re a newbie just dipping your toes into network analysis or cybersecurity, trust me, mastering filters can be a life-altering experience. It’s like tuning a good Intrusion Detection System (IDS); you get to zero in on the action without all the extraneous noise.

Been Around the Block?

Even if you’re an old hand in the biz, there’s still something for you. Ever try Wireshark’s ‘Statistics > Endpoints’ feature? It can quickly highlight active IP addresses in your packet captures, helping you pinpoint potential areas for a deep dive.

Special Operators: A Language of Their Own

Operators like == (equal), != (not equal), and in (membership) can turn your filters into finely-tuned instruments. When you’re in the trenches wrestling with complex queries, these operators are your best allies.

Customize to Your Heart’s Content

Remember, Wireshark isn’t a one-size-fits-all kind of tool. Tailor it to your needs. Want to exclude common protocols like ARP or STP? Toss in a filter like not (arp or stp or lldp or cdp or eth.addr == ff:ff) to clear out the clutter.

Wrapping Up

Being savvy with Wireshark filters isn’t just a “nice-to-have”; it’s a cornerstone skill for any cybersecurity professional. Whether you’re tracking down rogue malware or just conducting a routine security scan, a good grasp of filtering will serve you well.
So there you have it. Filters in Wireshark: not as intimidating as you thought, huh? Whether you’re brand new to this or a seasoned vet, learning to harness the power of filters is, hands down, a cybersecurity game-changer. In this realm, knowledge isn’t just a luxury; it’s your first line of defense. Happy packet hunting!

The Amber X: An Intuitive Leap into Personal Cloud Storage

The Amber X: An Intuitive Leap into Personal Cloud Storage

Oh man, I think Google Photos better watch out! 

In this digital age, we’re all searching for that ideal photo storage solution. Google Photos, for many, has been a trustworthy companion, yet its limitations often spark a quest for alternatives. So, let’s examine a potential challenger, the Amber X, priced at $249, and see if it ticks all the right boxes.

A Journey into Amber X

Setting up a Network Attached Storage (NAS) device can feel like wandering into a labyrinth. I personally run a Synology (https://synology.com) NAS with a crap load of drives for not just my photos, but all kinds of data storage and services (virtual machines, docker machines, basically a bunch of nerd stuff). But that setup cost me well over $2,000 for my 35TB of digital hoarding. (We’ll be looking at their Pro device in another post…I’m kind of giddy thinking about it).

But here’s the game-changer: Amber X. This device emphasizes user-friendliness and simplicity, shedding the complex layers that usually accompany such setups. Now I should specify that LatticeWorks did reach out to me and sent me these units for free. But if you all know me, you know I won’t pull any punches. My personal pet peeve is reading reviews that are afraid to just be upfront and honest about the product. So, here we go.  

Getting started with Amber X involves four straightforward elements: a power cord, a Bluetooth connection, a WiFi connection, and your mobile device. Now, get ready to be guided through the whole setup process by the super user-friendly Amber iX app. Whether you’re team iPhone, Android, Windows, or Mac, it’s got you covered. So sit back, relax, and let Amber iX lead the way, turning the installation journey into a piece of cake!

Amber X Product

Like all reviews, we have to cover what’s under the hood, strap in because we’re diving into the nuts and bolts of this bad boy. Trust me; these specs are impressive!

Ports? More like Porty Party!

Amber X comes loaded with multiple port options. You have an SD Card Reader for all your photo offloading needs. There’s also an HDMI 2.0 4K Output for when you want to showcase your media in high resolution. Your Amber X is also equipped with a Gigabit Ethernet Port, a USB 3.1 Gen 1 Type-A port for those of us who still love our USBs, and a 12V/2A DC Power port to keep the party going.

Amber X back view with ports
Amber X side view with SD card

Wireless Wonder

Amber X rocks the wireless world with 802.11ac 2×2 WiFi and Bluetooth for System Setup. No more cable spaghetti and the 2×2 means that it has two antennas supporting two data streams.

Storage, Storage, and More Storage

With a whopping 512GB High-Speed SSD Internal storage, Amber X is like a digital treasure chest. And guess what? You can expand this with USB 3.1 drive! It supports (hang on to your hats, folks) 2TB via SSD and up to 12TB via an external hard drive (like this one here on Amazon https://amzn.to/3oY4yfL). That’s what I call generous!

Processor and Memory? Lightning Fast!

The Amber X comes armed with a 64-Bit 6-Core ARM® Cortex® Processor and 2 GB DDR4 RAM. Dumbed down, Amber X is a lean, mean, speed machine.

Size and Weight

At 4.9 in x 4.91 in x 1.5 in and weighing just 0.66 lbs, Amber X is compact and super portable. It’s like carrying a feather that holds half your digital life!

Software and Security

Amber X is powered by its very own Amber OS. Your data is locked tight with Encrypted Data Transfer / Transport using TLSv1.3 and OpenSSL 1.1. It also offers Configurable Disk Encryption with dm-crypt AES-XTS cipher. Basically, Amber X is a freakin Fort Knox for your data.

Media Output – The Power of Three

Here’s where it gets interesting. Amber X supports Chromecast Output, Chromecast Ultra Output, and DLNA Output. The video formats supported include .avi, .mkv, .mov, and .mp4. In terms of video codecs, it supports H.264, VP8, and even H.265, VP9 for Chromecast Ultra and DLNA Output.

You can view image formats like .bmp, .gif, .jpeg, .png, and .webp. For you audiophiles, it supports .aac, .mp3, .mp4, .wav, and .webm formats. And here’s the cherry on top: you get bit rates of 5Mb/s with 2.4Ghz WiFi and a whopping 30 Mb/s with 5Ghz WiFi. That’s a lot of horsepower under Amber X’s sleek hood!

So, that’s the lowdown on Amber X’s specs. It’s pretty clear that Amber X isn’t just a pretty face; it’s a power-packed performer that can take on anything you throw at it!

There are so many features that we’re going to have to do several articles in the future.

Setup: Easy Peasy, Lemon Squeezy

Let’s get your shiny new device up and running without breaking a sweat! Sidebar: I’ll be using an Android device for my screenshots.

To start the setup, you’ll need to first download the Amber iX app from your app store.

You’ll then be presented with a couple of feature screens to remind you how awesome this device is. 

Joining the AmberCloud Family

If you’re new around here, you’ll need to create an AmberCloud account. Already part of the family? Then just log into your existing AmberCloud account. For the newbies, a special code will be zipping its way to your email inbox. If it takes longer than a coffee break (about 5-10 minutes), it might be playing hide-and-seek in your Spam folder.

Which Amber?

Next, you’ll have to choose which Amber device you have. Here’s a hint, Look at the images on your screen and then look at the device on your table. See, I told you this was easy!

Amber vs Amber X

Now if you’re GPS settings are turned off, the setup will detect that, and you’ll see the following screen. Location access is required during setup so the app can find and identify the Amber device. You can turn it off after setup if you want.

Amber iX App Location Settings

Permissions, Permission, Permission

The app also needs some permissions on your device to make it’s features work correctly. Nothing tricky here, if you want to backup your photos…then you’ll have to allow Amber access to your photos, right?!

Amber X App Permissions

BOOM! Found You!

If all goes well, the app will find your Amber device and begin to configure it. This might be a good time to go get an energy drink or grab a bite to eat, cause it might take a few minutes to finish the setup, and yes, they aren’t joking about hearing a couple of beeps during the setup!

Configure your Amber X

WiFi Wonders

Now, let’s make some digital connections. Setting up WiFi is our next step. You’ll be presented with a configuration screen for your WiFi settings. Even if you’re an Ethernet enthusiast. Trust me, it’s worth it. Now one bug I discovered here is that the Amber X will pickup which WiFi network your phone is connected to and won’t let you change it until after the setup is complete. I’ve reported this bug to their support folks, and I bet they’ll patch that, but just be aware of this.

What’s in a Name?

Time for a little personalization! You can give your Amber X a name. If you’re drawing a blank, don’t worry. Accept the default name for now. You can always change it when inspiration strikes. 

It’s ALIVE!

After it finishes, you’ll see your dashboard. You’ll see your Amber X appear. Now the first thing I’d do is apply any updates since there’s a good chance things have changed since your Amber came off the factory line.

And just like that, you’re all set! But remember, your journey with Amber X is just starting.

The Real Magic of Amber X

Once the setup is complete, the wizard will walk you through backing up all your photos/videos off your phone/device. And when I say “all your photos”, I mean photos and videos you’ve taken with your phone, from Tik-Tok, Twitter, Slack, Instagram, WhatsApp, heck, even Google Maps! Basically, any app on your device that utilizes photos or videos can be tagged. Now I did a custom backup because I don’t care about photos from some of these services, but I still had over 4,000 photos/videos that the Amber device picked up. But it’s cool because the Amber iX app works in the background, and after about an hour, all my images were backed up. Here’s what’s really cool. The app has an option to “clean up” your phone…which means to delete the photos/videos that have backed up off of your phone. Now you don’t have to worry about running out of space on your phone when you’re taking photos. I can always open the Amber iX app and look at all my photos/videos, plus i can share them with folks too!

Oh and if you’re wondering, my 4,000+ photos and video only took up 70GB. That’s just over 14% of what I can store on this bad boy. Now if you want more space, you can (as I mentioned earlier) add an external drive, or you might want to think about looking at the Amber Pro, which I’ll be looking at in my next post.

Artificial Intelligence, Say WHAT!

Okay, everyone, brace yourselves for the real game-changer: Amber’s AI-powered photo organization feature! As if Amber wasn’t already impressive enough, they’ve managed to incorporate AI technology to make it an even more powerful tool in our digital lives.

This feature is nothing short of magic, folks. Imagine, you’ve got thousands of photos stored – a typical scenario for most of us. But you’re trying to find that one particular shot from your summer vacation three years ago, or the sweet picture of your niece at her first birthday party. Normally, you’d be scrolling endlessly, right? But here’s where Amber’s AI comes into play.

Their sophisticated AI system has face-detection capabilities. Yes, you heard it right! It can identify faces, making it super easy to find pictures of specific people. But wait, it gets better. This AI doesn’t just stop at recognizing faces, it can also identify objects and locations. So whether you’re searching for a sunset picture taken at the Grand Canyon or photos of your beloved pet, Amber’s AI has got you covered.

Now, I know what you’re thinking. ‘Isn’t that a bit creepy? Could this mean my personal data is at risk?’ Rest assured, your data privacy is a top priority for Amber. The amazing part of this all-in-one smart storage platform is that while it leverages advanced AI technology, it does so with the utmost respect for your privacy. Your data stays your data, not shared with anyone else. So you can enjoy the convenience of advanced AI photo organization, without the usual privacy concerns.

In a nutshell, Amber’s AI gives you the power of an advanced photo search engine, all while ensuring your precious memories remain safely under your control. It’s like having your very own, private Google Photos, WITHOUT the yearly fees!

It’s Not Just about Photos/Videos!

Digging deeper, the true magic of Amber X reveals itself in the Backup feature. This feature vigilantly tracks changes in specific folders (and the files inside), automatically initiating a backup with each modification. It’s a lifesaver for those of us who forget to backup our files regularly – an effortless alternative to running a full drive backup each time a new file appears. It’s basically like your own Dropbox!

Securing Your Data with Amber X

When it comes to security, Amber X stands its ground. The device leverages two distinct layers of encryption: TLSv1.3 and the dm-crypt AES-XTS cipher, adding robust protection against unauthorized access.  So whether it’s photos & videos or important documents, Amber X has your back. With its powerful combination of automation and security, it’s easy to see why tech-savvy users are looking closely at this solution.

Something You Can’t Put a Dollar Figure On

Oh, and folks, we can’t wrap up without talking about Amber’s exceptional customer service. It’s like a cherry on top of their already impressive product. Let me share my personal experience with you.

Like many of us, I’ve had my fair share of less-than-stellar customer service experiences. We’ve all been there, right? But when I faced a small hiccup with my Amber device, I decided to give their customer service a try. I initiated a chat session, fully prepared to be tossed from one representative to another. But to my pleasant surprise, the exact opposite happened!

Not only did the representative – shoutout to the fantastic Michael – stay with me throughout the session, he helped me resolve the issue without any hint of rushing. His patience was truly commendable, and his level of dedication to ensuring my issue was fully resolved blew me away.

And guess what the best part was? This top-tier service didn’t cost me a penny. It’s truly refreshing to see a company standing by its product without hidden fees for customer support. Far too often, we purchase a product, only to be slammed with support charges when we need help. But with Amber, it’s a whole different story – a story of commitment, quality service, and customer satisfaction.

So kudos to Michael and the entire Amber customer service team. Your dedication is appreciated and certainly doesn’t go unnoticed. They’ve set the bar high, folks, and it’s about time other companies take a leaf out of their book!

The Verdict: Is Amber X Worth It?

If you’ve been pondering, “Is Google Photos really the best photo storage option?” then the arrival of Amber X might tip the scales. With its streamlined setup, abundant storage capacity, and interface that champions user-friendliness, no monthly/yearly fees and no compression of your photos, Amber X redefines personal cloud storage.

The device shines whether you’re transitioning to a new phone or decluttering your hard drive. While there are minor differences in the user experience between the desktop and mobile apps, the Amber X is largely an efficient and versatile device.

So, should you invest in an Amber X? If you appreciate the ease of use, and storage flexibility, and you’re in the market for a reliable Google Photos alternative, then Amber X is certainly worth exploring. While no solution is flawless, the Amber X presents a compelling case as a comprehensive and user-friendly alternative to mainstream cloud storage options. I’ll be recommending this device to my family and friends.

The Importance of CEH Certification

The Importance of CEH Certification

As businesses increasingly rely on technology, the need for cybersecurity professionals has grown exponentially. With cyber threats becoming more sophisticated, it’s crucial for organizations to have skilled cybersecurity experts who can protect their networks and systems. One way for professionals to showcase their expertise in this field is by earning a Certified Ethical Hacker (CEH) certification.

What is CEH Certification?

The CEH certification is a professional certification that validates an individual’s knowledge of network security and hacking methodologies. The certification is provided by the International Council of E-Commerce Consultants (EC-Council) and is globally recognized in the cybersecurity industry.

The Benefits of CEH Certification

  1. High Demand: With the increase in cyber threats, there is a high demand for certified ethical hackers. The certification demonstrates that a professional has the skills and knowledge to protect an organization’s systems and networks.
  2. Competitive Advantage: The CEH certification provides a competitive advantage for cybersecurity professionals over others who may not have the certification. Employers often prefer certified professionals when hiring for cybersecurity roles.
  3. Industry Recognition: The CEH certification is recognized by many organizations, including government agencies and Fortune 500 companies. This recognition can lead to better job opportunities and higher salaries.
  4. Hands-On Training: CEH certification provides hands-on training that allows professionals to understand the latest hacking techniques and countermeasures. This knowledge can help professionals detect and prevent cyber-attacks.

Exam Requirements

To earn the CEH certification, candidates must pass a multiple-choice exam consisting of 125 questions within four hours. The exam covers various topics, including network security, malware analysis, and social engineering.

CEH Certification Renewal

CEH certification is valid for three years, after which professionals must renew their certification by earning continuing education credits or retaking the exam. Renewal ensures that professionals stay up-to-date with the latest cybersecurity techniques and technologies.

Conclusion

CEH certification is valuable for cybersecurity professionals looking to advance their careers. It provides the knowledge and skills to protect organizations from cyber threats and demonstrates a commitment to the field. Employers value certification and often prefer to hire certified professionals. With the demand for cybersecurity professionals on the rise, CEH certification is a step towards a rewarding career in this field.

CEH Certification Benefits

CEH Certification Benefits

Are you interested in a career in cybersecurity? Then you may have heard of the CEH certification. This certification is highly sought after by professionals in the field, and for good reason.

In 2005, the US Department of Defense issued a directive requiring anyone who handles US government IT to have baseline IT certifications, including ethical hacking. This is one of the reasons why cybersecurity professionals pursue the CEH certification. It’s not only an industry standard, but it’s also internationally recognized and valid in IT industries across the world.

Having a CEH certification on your résumé is a valuable asset.

It demonstrates that you understand how hackers think, and with the recent rise in hacking incidents, professionals with this certification are in high demand.

So, who should consider obtaining a CEH certification? If you’re a cybersecurity officer in your company, a penetration tester, an internal or external auditor, a security professional, a standard administrator or consultant site administrator, or even just a tech-savvy home user who wants to know how secure their environment is, then this certification may be right for you.

But what does it take to become a CEH? There are standards to maintain, including skills, values, and ethics from the International Council of E-Commerce Consultants (EC-Council) Code of Ethics. You can find more information about these requirements at https://www.eccouncil.org/code-of-ethics. Some of the critical requirements include privacy, disclosure, area of expertise, unauthorized usage, authorization, project management, knowledge sharing, confidence, legal limits, and underground communities.

Let’s look at each of them in detail.

Privacy: Ethical hackers have access to sensitive information like social security numbers, customer databases, and intellectual property. It is their responsibility to protect this information and not use, steal, modify, change, or destroy it.

Disclosure: Ethical hackers may come across unsettling or uncomfortable information or content, but their duty is to report it to authorities or concerned people. They must disclose everything they discover, regardless of how grave or discomforting it may be.

Area of expertise: Ethical hackers should be honest about their level of knowledge, skill sets, and limitations. They should not misrepresent themselves and should ask for an expert’s help if they lack the necessary experience or training.

Unauthorized usage: Ethical hackers should avoid using illegal or unethically obtained software and hardware. They should also not accept bribes or join in for personal gain if they uncover evidence of unauthorized usage in a company.

Authorization: Ethical hackers must use resources, data, and information in authorized ways. They should let the company know how they intend to use the data and ensure they get consent where necessary.

Disclosure: Ethical hackers should verify with or notify the hardware manufacturer when they discover an issue in hardware or software before going public. If the manufacturer does nothing, they should blow the whistle to save users and share the solution if possible.

Project management: Ethical hackers need to have great management skills to be efficient and manage their projects effectively. They should set clear goals, have a reasonable project timeline, and communicate effectively.

Knowledge sharing: Ethical hackers commit to learning, keeping up with new developments, and creating public awareness by teaching or giving free lectures, spreading information on social media platforms, and enlightening the people they know about securing hardware and software.

Confidence: Ethical hackers should always present themselves in a professional, honest, and competent manner, even when competing with someone else for a project. They should be experienced with any software, tricks, or tools they utilize against a network and not fix issues outside the scope of their project.

Legal limits: Ethical hackers should only accept approved, authorized, and legal projects and follow the code of ethics in making decisions.

Underground communities: Ethical hackers should not engage in black-hat activities or associate with communities of black-hat hackers. They should not aid or help black-hat hackers advance their mission and only engage them to learn what’s new, what they know, what they do, and how they think.

Social Media Layoffs: The Impact It Will Have On You And Your Digital Citizenship

Social Media Layoffs: The Impact It Will Have On You And Your Digital Citizenship

In recent weeks, both Twitter and Facebook have made headlines for laying off a significant number of employees. An estimated 7500 employees were laid off at Twitter and it’s been reported that Meta (Facebook’s parent company) laid off more than 11,000. While these layoffs are undoubtedly having an impact on the companies themselves, they also raise important questions about what they could mean for the users of these social media platforms. Quite frankly, I’m shocked this isn’t one of the main takeaways from all of this. Let’s take a closer look at the potential implications of these layoffs.

Less Money for Innovation And Expansion

One of the most immediate impacts of these layoffs is that there will be less money available for innovation on Twitter and Facebook. This is because, when a company lays off employees, it is also losing its collective knowledge and expertise. In a lot of cases, these budgets get cut along with the workforce. For example, when Facebook laid off its team of Trending Topics curators, it lost a wealth of experience and knowledge about what topics are being talked about online. As a result, the company has been forced to rely more heavily on algorithms to surface Trending Topics, with mixed results.

In addition, with fewer employees working on a given project, there is less capacity for trial and error. This means that we can expect to see fewer new features being rolled out across all social media platforms in the coming months. So if you’re waiting for that new Facebook update or that new Twitter tool, you may have to wait a little longer than usual.

Fewer Customer Service Resources

Another potential impact of the social media layoffs is that there may be fewer customer service resources available to users. This is because, when companies lay off employees, they often do so in areas where they feel they can save the most money. And customer service is typically one of those areas. If you’ve noticed that it’s taking a bit longer to get a response from Twitter or Facebook when you report a problem, this is likely why.

An Increase In Social Media Scams

Hackers are opportunists (the good kind and bad). There are already numerous social media scams hitting every social media platform out there. I highly suspect that social media scams attacking Facebook and Twitter users will ramp up in the coming weeks.

DISCOVER: The Most Popular Social Media Scams

Lack Of Resources For Security

Yes, many of these layoffs have been those in roles of management (at least with Twitter). But we don’t know the entire scope of which departments and job titles were impacted. These companies are going to hesitate to release a detailed itemized sheet of what people and departments were affected the most. Regardless, your personal data being stored on any of these social media companies’ servers could be at risk. Heck…they’re always at risk when budgets are endless and companies do have all the resources. So what should you do?

Quick + Effective Ways To Protect Your Social Media Accounts

Enable 2FA Where Possible

Two-factor authentication (2FA), a sort of multi-factor authentication (MFA), is a security procedure that cross-verifies people using two separate types of identity. This type of added security feature will help you get that extra layer of protection in addition to putting in your password. In my opinion, if ANY platform, app, website, etc. will allow you to enable 2FA…YOU DO IT. The good news is both Facebook and Twitter have the option to enable two-factor authentication. Is it annoying to use at times? I’d be lying if I said “No.” But considering how much personal information and data these social media servers have on you…it would be very wise to enable 2FA.

RELATED: What Is Two-Factor Authentication?

Change Your Passwords

You’d be surprised how some people never change their passwords. You’d be even more surprised by the number of people that have dumb passwords that can easily be hacked. I’ve detailed exactly how you can make your passwords strong and more secure.

LEARN MORE: Best Tips For Making Passwords Strong And Secure

Get LastPass Password Manager

This one is especially useful for those who have multiple users who access social media accounts. One thing I despise about Facebook is how you have to have a personal account to run ads. I’ve seen some ad management accounts with half a dozen people tied to them. Each one of these is a potential entry point and cyber security risk. If you have ANY social media account (business branded or personal) where more than one person accesses it, I would get LastPass Password Manager right now to help with password management. We have an entire beginner’s guide to LastPass if you want to dive into the details.

BOOKMARK THIS: LastPass Password Manager Review

Social Media Layoffs Will Impact You

The layoffs at Twitter and Facebook are undoubtedly having an impact on the companies and their users. With fewer resources available for innovation and customer service, users can expect to see fewer new features and may have difficulty getting help when they need it. However, it’s important to remember that social media platforms are still incredibly popular and widely used despite these challenges. While the layoffs may be having an impact in the short term, it’s unlikely that they will have a significant long-term effect on either company’s bottom line.

Pin It on Pinterest