<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Security on Teddy Ferdinand</title><link>https://tferdinand.net/en/categories/security/</link><description>Recent content in Security on Teddy Ferdinand</description><generator>Hugo</generator><language>en-US</language><lastBuildDate>Wed, 29 Apr 2026 13:19:30 +0000</lastBuildDate><atom:link href="https://tferdinand.net/en/categories/security/index.xml" rel="self" type="application/rss+xml"/><item><title>Why `curl | bash` is a dangerous bad habit</title><link>https://tferdinand.net/en/why-curl-bash-is-a-dangerous-bad-habit/</link><pubDate>Wed, 29 Apr 2026 09:42:21 +0000</pubDate><guid>https://tferdinand.net/en/why-curl-bash-is-a-dangerous-bad-habit/</guid><description>&lt;p&gt;Recently, I stumbled again upon an old bad habit from the Linux/DevOps/Cloud world: installing a tool with a command like:&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" class="chroma"&gt;&lt;code class="language-fallback" data-lang="fallback"&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;curl -sSL https://example.com/install.sh | bash
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Or worse:&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" class="chroma"&gt;&lt;code class="language-fallback" data-lang="fallback"&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;curl -sSL https://example.com/install.sh | sudo bash
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;We have all seen it before.&lt;br&gt;
We have probably all used it at some point.&lt;/p&gt;
&lt;p&gt;And let’s be honest for a minute: in many official documentations, this is still presented as the “simple” way to install a tool.&lt;/p&gt;</description></item><item><title>Attack techniques: understanding ARP poisoning</title><link>https://tferdinand.net/en/attack-techniques-understanding-arp-poisoning/</link><pubDate>Fri, 21 Oct 2022 05:37:16 +0000</pubDate><guid>https://tferdinand.net/en/attack-techniques-understanding-arp-poisoning/</guid><description>&lt;h4 id="disclaimer"&gt;Disclaimer&lt;/h4&gt;
&lt;p&gt;As often on this kind of post, I would like to remind you that the content you will find here is for educational purposes only.&lt;/p&gt;
&lt;p&gt;Unauthorized intrusion in an information system is punishable by fine and/or imprisonment.&lt;/p&gt;
&lt;p&gt;Understanding attacks means knowing how to avoid them. In this post, I propose you see a common network attack model: ARP poisoning.&lt;/p&gt;
&lt;h2 id="what-is-arp"&gt;What is ARP?&lt;/h2&gt;
&lt;p&gt;To understand the attack, we must already understand what it is based on.&lt;/p&gt;</description></item><item><title>For an effective security posture</title><link>https://tferdinand.net/en/for-an-effective-security-posture/</link><pubDate>Mon, 01 Feb 2021 06:57:00 +0000</pubDate><guid>https://tferdinand.net/en/for-an-effective-security-posture/</guid><description>&lt;p&gt;I’ve been working in the IT field for more than 10 years now and I’ve worked with a lot of “security” teams within the companies I’ve been in. I’ve been a security guy (Cloud Security Architect) for a little over a year now.&lt;/p&gt;
&lt;p&gt;During these years, I often noticed a blocking posture of the security teams, sometimes even disconnected from the field, leading to slowdowns and tensions in the projects.&lt;/p&gt;</description></item><item><title>The danger of Grey IT in companies</title><link>https://tferdinand.net/en/the-danger-of-grey-it-in-companies/</link><pubDate>Mon, 18 Jan 2021 07:48:00 +0000</pubDate><guid>https://tferdinand.net/en/the-danger-of-grey-it-in-companies/</guid><description>&lt;p&gt;Confined spaces have changed our work habits a lot. Telecommuting has become something more common than it was just a year ago.&lt;/p&gt;
&lt;p&gt;With the implementation of telecommuting very quickly, new risks have appeared. Today, I suggest talking about Grey IT.&lt;/p&gt;
&lt;h2 id="what-is-grey-it"&gt;What is Grey IT?&lt;/h2&gt;
&lt;p&gt;In a company, in a classical way, the applications used are referenced in a service catalog.&lt;/p&gt;
&lt;p&gt;For example, if your company uses Slack, the office service knows it, and will configure this application so that it works with the company’s security and confidentiality standards.&lt;/p&gt;</description></item><item><title>Test your antivirus with a cryptolocker (mastered)</title><link>https://tferdinand.net/en/test-your-antivirus-with-a-cryptolocker-mastered/</link><pubDate>Fri, 04 Dec 2020 06:00:00 +0000</pubDate><guid>https://tferdinand.net/en/test-your-antivirus-with-a-cryptolocker-mastered/</guid><description>&lt;p&gt;Computer attack patterns have evolved in recent years. Cryptolockers have become the spearhead of many hackers.&lt;/p&gt;
&lt;p&gt;Does your antivirus vendor promise you that you are protected against these new threats? OK, prove it before you get stuck by a real attack.&lt;/p&gt;
&lt;h2 id="lets-talk-about-cryptolocker"&gt;Let’s talk about cryptolocker&lt;/h2&gt;
&lt;p&gt;The principle of a cryptolocker is quite simple: encrypt target files (often.doc, .txt, . odt, etc.) and then demand a ransom. A ransomware has nothing to gain by destroying the underlying OS, so system files are rarely touched.&lt;/p&gt;</description></item><item><title>Being a hacker isn't like being in the movies!</title><link>https://tferdinand.net/en/being-a-hacker-isnt-like-being-in-the-movies/</link><pubDate>Sun, 23 Aug 2020 18:19:46 +0000</pubDate><guid>https://tferdinand.net/en/being-a-hacker-isnt-like-being-in-the-movies/</guid><description>&lt;p&gt;Hackers … we often see them in movies and TV shows. These experts are able to hijack NSA satellites with a string and a nail clipper (#MacGyver)! (Cover image from the movie Die hard 4)&lt;/p&gt;
&lt;p&gt;I decided today to tell you about hacking in &amp;ldquo;real life&amp;rdquo;. I consider myself to be a white hat (an ethical hacker) and I’m going to tell you about the common methods a hacker uses. I will focus here on the simplest part: websites.&lt;/p&gt;</description></item><item><title>What the Twitter hack teaches us (or reminds us of)</title><link>https://tferdinand.net/en/what-the-twitter-hack-teaches-us-or-reminds-us-of/</link><pubDate>Fri, 17 Jul 2020 22:00:00 +0000</pubDate><guid>https://tferdinand.net/en/what-the-twitter-hack-teaches-us-or-reminds-us-of/</guid><description>&lt;p&gt;A few days ago, Twitter was the target of a hack inviting, via &amp;ldquo;verified accounts&amp;rdquo;, users to send BitCoins to receive double the amount. I suggest a small post on what we can learn from this attack, from a computer security point of view.&lt;/p&gt;
&lt;h4 id="disclaimer"&gt;Disclaimer&lt;/h4&gt;
&lt;p&gt;The purpose of this article is not to make an umpteenth analysis of this attack, but rather to recall some basic rules of computer security that this attack reminds me of.&lt;/p&gt;</description></item><item><title>Turn your AWS DevSecOps Pipeline into bunker - Part 1</title><link>https://tferdinand.net/en/turn-your-aws-devsecops-pipeline-into-bunker-part-1/</link><pubDate>Thu, 18 Jun 2020 20:02:35 +0000</pubDate><guid>https://tferdinand.net/en/turn-your-aws-devsecops-pipeline-into-bunker-part-1/</guid><description>&lt;blockquote&gt;
&lt;p&gt;This post was co-authored by &lt;a href="https://zoph.me/"&gt;Victor Grenu&lt;/a&gt;. Who is working as Cloud Architect&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;In this series, we will talk about the emergence of the DevSecOps movement, and more especially, what are the benefits of introducing a DevSecOps approach on your existing CI/CD Pipelines.&lt;/p&gt;
&lt;h2 id="cicd-pipeline"&gt;CI/CD Pipeline&lt;/h2&gt;
&lt;p&gt;To give you some context, you will find in the diagram below a standard CI/CD Pipeline.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://i.imgur.com/EMznwrL.png" alt=""&gt;&lt;/p&gt;
&lt;h2 id="devsecwhat"&gt;DevSecWhat?&lt;/h2&gt;
&lt;p&gt;DevSecOps could be defined as a shift from a central internal security team to the inclusion of security practices into the existing DevOps teams: DevSecOps&lt;/p&gt;</description></item><item><title>The difficulty of antibot fight on the web</title><link>https://tferdinand.net/en/the-difficulty-of-antibot-fight-on-the-web/</link><pubDate>Wed, 03 Jun 2020 06:36:01 +0000</pubDate><guid>https://tferdinand.net/en/the-difficulty-of-antibot-fight-on-the-web/</guid><description>&lt;p&gt;Robots, more commonly known as bots, are now plentiful on the Internet. They account for a significant share of global Internet traffic.&lt;/p&gt;
&lt;p&gt;Today, I propose you to discover the world of Internet bots.&lt;/p&gt;
&lt;h2 id="bots-but-what-for"&gt;Bots&amp;hellip; but what for?&lt;/h2&gt;
&lt;p&gt;The first question one might ask would be why bots are roaming freely on the Internet.&lt;/p&gt;
&lt;p&gt;You use, sometimes unknowingly, bots every day when you surf the Internet. You have run a search on a search engine, a bot has indexed it before for you. A large part of the messages from companies on social networks come from bots that publish them in their name.&lt;/p&gt;</description></item><item><title>What are the differences between end-to-end encryption and encryption in transit?</title><link>https://tferdinand.net/en/what-are-the-differences-between-end-to-end-encryption-and-encryption-in-transit/</link><pubDate>Mon, 20 Apr 2020 15:34:51 +0000</pubDate><guid>https://tferdinand.net/en/what-are-the-differences-between-end-to-end-encryption-and-encryption-in-transit/</guid><description>&lt;p&gt;With the coronavirus crisis, the use of external technologies is necessary.&lt;/p&gt;
&lt;p&gt;For this post, I will talk (among others) about Zoom, the trendy application for video conferencing that plays on the terms for securing their solution.&lt;/p&gt;
&lt;h2 id="encrypting-exchanges-why"&gt;Encrypting exchanges, why?&lt;/h2&gt;
&lt;p&gt;Why do we do encryption? There can be many reasons, the most obvious is to avoid data interception.&lt;/p&gt;
&lt;p&gt;In the case of an encrypted exchange, even if my data stream were intercepted, the impact would be nil, since the attacker would be unable to read this stream, assuming of course that I have set up a strong enough encryption.&lt;/p&gt;</description></item><item><title>I got phished, but its for science!</title><link>https://tferdinand.net/en/got-phished-but-its-for-science/</link><pubDate>Mon, 30 Mar 2020 05:00:00 +0000</pubDate><guid>https://tferdinand.net/en/got-phished-but-its-for-science/</guid><description>&lt;p&gt;We often hear about scam, phising.&lt;/p&gt;
&lt;p&gt;Today, I have a special note for you: I was deliberately phished to show you the other side of the world!&lt;/p&gt;
&lt;h2 id="point-very-important"&gt;Point VERY important!&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;The manipulations that you will see below (and in particular the fact of voluntarily going on a phishing site) can be dangerous for your system and/or your personal data. They have been made in a sandbox environment and must not be reproduced without prior protection.&lt;/strong&gt;&lt;/p&gt;</description></item><item><title>Containment: Danger to SI</title><link>https://tferdinand.net/en/containment-danger-to-si/</link><pubDate>Mon, 23 Mar 2020 07:49:00 +0000</pubDate><guid>https://tferdinand.net/en/containment-danger-to-si/</guid><description>&lt;p&gt;For a week now, many of us have been housebound. Telework has been the weapon that many companies have drawn to keep their business going, so many do not understand why some companies that used to do little or no telework are now able to operate full telework. Similarly, some do not understand that even in the IT field, there are still people who have to work on-site. A brief overview&amp;hellip;&lt;/p&gt;</description></item><item><title>No, the padlock next to your address bar doesn't mean a site is "reliable."</title><link>https://tferdinand.net/en/no-the-padlock-next-to-your-address-bar-doesn-t-mean-a-site-is-reliable/</link><pubDate>Sat, 21 Sep 2019 07:27:39 +0000</pubDate><guid>https://tferdinand.net/en/no-the-padlock-next-to-your-address-bar-doesn-t-mean-a-site-is-reliable/</guid><description>&lt;p&gt;I regularly see this message on shopping sites, and I see that confusion is often made about what a secure connection is.&lt;/p&gt;
&lt;h2 id="securing-the-exchange-with-the-web-server"&gt;Securing the exchange with the web server&lt;/h2&gt;
&lt;p&gt;The presence of a lock near the address bar means that this site is using a TLS certificate to exchange data with you. This ensures that the data exchanged with you is encrypted. The primary purpose of a TLS certificate is to prevent &amp;ldquo;man in the middle&amp;rdquo; attacks.&lt;/p&gt;</description></item><item><title>Security: A major new challenge for companies</title><link>https://tferdinand.net/en/security-a-major-new-challenge-for-companies/</link><pubDate>Fri, 31 May 2019 07:11:54 +0000</pubDate><guid>https://tferdinand.net/en/security-a-major-new-challenge-for-companies/</guid><description>&lt;p&gt;Security is a term we often hear these days, yet behind this simple word lie many aspects.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;This article contains many links to sources or definitions of certain terms, feel free to click on them. (Several links are in french language)&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;LinkedIn, WhatsApp, iCloud, Renault : What do these companies have in common? They have all been victims at one time or another of a compromise of their information system.&lt;/p&gt;</description></item></channel></rss>