{"id":89,"date":"2018-10-21T18:50:40","date_gmt":"2018-10-21T18:50:40","guid":{"rendered":"http:\/\/vroamam.com\/wordpress\/?p=89"},"modified":"2020-11-17T18:58:12","modified_gmt":"2020-11-17T17:58:12","slug":"why-every-it-manager-should-do-ceh","status":"publish","type":"post","link":"https:\/\/vroamam.com\/wordpress\/blog\/why-every-it-manager-should-do-ceh\/","title":{"rendered":"Why every IT Manager should do CEH"},"content":{"rendered":"\n<p>Ok, so the title is a bit controversial, I wanted people to read the article. I know that EC Council\u2019s ethical hacking qualification is not popular amongst the security community and believe me I know first-hand, having gone with high hopes, just why that is.<\/p>\n\n\n\n<p>I had always wanted to take that course, I got the\nopportunity and it was a huge let down. I didn\u2019t become an ethical hacker. I didn\u2019t\nbecome any kind of hacker at all. What I did get from it though was an\nawareness, an insight, an overview of things I never even dreamed possible.<\/p>\n\n\n\n<p>The first computer that I touched was a Sinclair ZX80 and yes I am that old. I was in the military and \u201cThe Computer Club\u201d got one to use alongside the Tandy TRS-80 we had all learned to program on. We were so excited we all chipped in to get the 16Kb RAM pack \u2013 yes that is right an additional 16Kb of RAM. Since then I\u2019ve worked in or taught IT, computing and communications at various times in my career. For the past fifteen years I\u2019ve been an IT manager either in education or in industry.<\/p>\n\n\n\n<p>Until June 2018, I had never heard the words Netcat, RAT, Metasploit,\nMeterpreter, MSVenom or Mimikatz. Until very recently I had no idea that Microsoft,\nin their wisdom, store my password in plain text memory.<\/p>\n\n\n\n<p>I had on occasion attended a variety of \u201cfree\u201d workshops and demonstrations. I\u2019d listened avidly to James Lyne and watched demonstrations of his at various Sophos events and I watched a number of TED Talks by Mikko Hypponen from F-Secure. What these two gents showed me seemed like magic. Surely this was the world of some very special, very technical and very evil groups of geniuses (by the way I am pretty sure James Lyne is an evil genius). I never for one-minute thought it was possible for any young kid to get the software, for free and start hacking. Like many of my uninformed colleagues, I had a long held and traditional belief that AV and Malwarebytes would be the combined answer to all my woes \u2013 if they didn\u2019t find anything then I must be OK.<\/p>\n\n\n\n<p>Things changed after Wannacry. I think the landscape changed immeasurably. For the first time of any note, computer security was making headline news on prime time TV. CEOs, CFOs and other senior staff were asking \u2013 \u201ccould this happen to us?\u201d<\/p>\n\n\n\n<p>My answer when asked was an unquestionable yes it could. I knew enough by this point that one click on an attachment by any member of staff could bring this or something similar into us. I still believed that AV and endpoint software was probably the answer, but I was genuinely worried. The events saw a significant increase in our security budget not long after that. A security steering group was changed and was now chaired by the CFO and  business leaders took an active interest.<\/p>\n\n\n\n<p>The extra budget got me the opportunity to go and do CEH. I\u2019ve never been so excited about any training ever. I took five days from my busy schedule in the summer and I was sent me to Dublin to do an ethical hacking course. I was absolutely astounded by what was possible. I hung on every word the instructor said and every lab we worked through. Scanning, enumeration, foot printing, exploiting\u2026 all words and steps that had never even entered my conscious thought before. <\/p>\n\n\n\n<p>Using NMAP properly for the first time, understanding what the switches actually meant and seeing what one can do with it was beautiful and informative. Seeing what information Microsoft and Google kindly give away to the world on my behalf was shocking but enlightening.<\/p>\n\n\n\n<p>Working through a single very simple exploit using Backtrack 5 and  exploiting MS08_067 with Metasploit was the single most terrifying, eye opening and pleasurable thing I\u2019ve ever done in my thirty years in IT\u2026 looking at what was possible in the meterpreter console filled me with a mixture of fear and intrigue.<\/p>\n\n\n\n<p>Maybe I was lucky, maybe I did a good course and had an experienced instructor who gave me a taste of what was possible, I don\u2019t know, but I came back from those five days with an appetite for learning not seen for many years and a whole new view on what I need to do to secure the systems that I looked after.<\/p>\n\n\n\n<p>A few weeks ago, a subsidiary of the company I work for were successfully breached. It was a small acquisition who had been left to \u201cdo their own thing\u201d. An exposed RDP session and weak passwords invited a very non-technical breach. The IT services company who had supported that business had never tested restores from backups and never restored more than a few files. Certainly not a whole machine. Part of their remediation plan was to run Malwarebytes on every machine \u2013 there&#8217;s that cure all again.<\/p>\n\n\n\n<p>CEH does not in any way prepare you or make you an ethical hacker. I do believe though that it has a place in our world and a place that should be better spoken of. Taken in the right context it can lead the student to a path of enlightened cyber security awareness in which Malwarebytes has no part, in which you can at least look at your estate and see the holes even if you don\u2019t yet know how to fix them. It can engage you in a whole new world of possibilities and can change minds on a variety of things not least of which could result in more regular, more timely patching and a much better understanding of the consequences of not doing that simple task. It may bring a more informed risk assessment of not patching &#8220;because it breaks stuff&#8221; vs not patching and being breached, with a much clearer view of what breached means.<\/p>\n\n\n\n<p>The one thing cyber security people are not good at \u2013 getting small businesses and small business IT managers to believe that what they say is possible, is actually possible and not just possible, but very easy to achieve.<\/p>\n\n\n\n<p>So I go back to the article title, maybe all IT managers should do CEH. We, those of us who now know what&#8217;s possible, should encourage the use of multiple-choice courses like CEH. By all means, make clear to those who take them the basic level at which they are pitched, but be positive. Maybe if we encourage the plethora of multi skilled IT people who look after and care for small businesses to take these courses we\u2019ll see a more informed approach to cyber security from a wider part of the industry, one of the biggest parts of the industry and one that still thinks cyber security is just about a firewall, good Anti-Virus and that there is no risk exposing RDP to the world.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ok, so the title is a bit controversial, I wanted people to read the article. I know that EC Council\u2019s ethical hacking qualification is not popular amongst the security community and believe me I know first-hand, having gone with high hopes, just why that is. I had always wanted to take that course, I got [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"on","ocean_gallery_id":[],"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[2],"tags":[5,7,6,8],"class_list":["post-89","post","type-post","status-publish","format-standard","hentry","category-cybersec","tag-ceh","tag-cyber-security","tag-ethical-hacking","tag-information-security","entry"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/pahuGk-1r","jetpack_likes_enabled":true,"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/vroamam.com\/wordpress\/wp-json\/wp\/v2\/posts\/89","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/vroamam.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/vroamam.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/vroamam.com\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/vroamam.com\/wordpress\/wp-json\/wp\/v2\/comments?post=89"}],"version-history":[{"count":4,"href":"https:\/\/vroamam.com\/wordpress\/wp-json\/wp\/v2\/posts\/89\/revisions"}],"predecessor-version":[{"id":648,"href":"https:\/\/vroamam.com\/wordpress\/wp-json\/wp\/v2\/posts\/89\/revisions\/648"}],"wp:attachment":[{"href":"https:\/\/vroamam.com\/wordpress\/wp-json\/wp\/v2\/media?parent=89"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/vroamam.com\/wordpress\/wp-json\/wp\/v2\/categories?post=89"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/vroamam.com\/wordpress\/wp-json\/wp\/v2\/tags?post=89"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}