<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Stories by Rabbit7 on Medium]]></title>
        <description><![CDATA[Stories by Rabbit7 on Medium]]></description>
        <link>https://medium.com/@Rabbit7?source=rss-39acb25bed18------2</link>
        <image>
            <url>https://cdn-images-1.medium.com/fit/c/150/150/1*dYZB6GG5rH8WEpXRNHdvZg.jpeg</url>
            <title>Stories by Rabbit7 on Medium</title>
            <link>https://medium.com/@Rabbit7?source=rss-39acb25bed18------2</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Mon, 18 May 2026 12:46:48 GMT</lastBuildDate>
        <atom:link href="https://medium.com/@Rabbit7/feed" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[Safer Internet Day: Making the Digital World Better for Everyone]]></title>
            <link>https://medium.com/@Rabbit7/safer-internet-day-making-the-digital-world-better-for-everyone-b3ae39b0af06?source=rss-39acb25bed18------2</link>
            <guid isPermaLink="false">https://medium.com/p/b3ae39b0af06</guid>
            <category><![CDATA[safe-internet-day]]></category>
            <category><![CDATA[digital-india]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[cyber-security-awareness]]></category>
            <category><![CDATA[security-training]]></category>
            <dc:creator><![CDATA[Rabbit7]]></dc:creator>
            <pubDate>Tue, 11 Feb 2025 14:02:34 GMT</pubDate>
            <atom:updated>2025-02-11T14:02:34.482Z</atom:updated>
            <content:encoded><![CDATA[<h3>Introduction</h3><p>Friends, in today’s world, the Internet has become like our daily roti-sabzi — we simply cannot live without it! But just like we need to be careful on the road, we must be careful on the Internet too. This paper will tell you all about Safer Internet Day, which happens every year to help people use the Internet without any tension.</p><h3><strong>What is Safer Internet Day?</strong></h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/532/0*BQFGD2GshBOK6D5Y.png" /><figcaption><a href="https://bfsi.eletsonline.com/wp-content/uploads/2020/02/safer-Internet-day.png">https://bfsi.eletsonline.com/wp-content/uploads/2020/02/safer-Internet-day.png</a></figcaption></figure><p>Safer Internet Day started in 2004 and happens on the second Tuesday of February every month. It’s like a big awareness campaign where people from different countries come together to make the Internet a better place. The main goal is to teach everyone, from small bachche to old dadaji dadiji, how to stay safe while using the Internet.</p><h3>Why Do We Need Internet Safety?</h3><p>Just like we keep our house doors locked to prevent theft, we need to protect ourselves on the Internet. Here are some problems we face:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/900/0*8efkkCd0ITdsjB7G" /><figcaption><a href="https://x.com/bsesdelhi/status/1810888137150976246">https://x.com/bsesdelhi/status/1810888137150976246</a></figcaption></figure><ol><li>Cyber criminals who try to steal our personal information</li><li>Bad people who spread fake news on WhatsApp and Facebook</li><li>Online bullies who trouble others</li><li>Dangerous websites that can harm our computers</li><li>People who try to cheat us and take our money</li></ol><figure><img alt="" src="https://cdn-images-1.medium.com/max/600/0*NEBoeMxV4JbE8JUj.jpg" /><figcaption><a href="https://timesofindia.indiatimes.com/city/pune/money-trail-in-2-web-task-frauds-goes-from-bank-a/cs-to-e-wallets-to-crypto-exchanges/articleshow/102187090.cms">https://timesofindia.indiatimes.com/city/pune/money-trail-in-2-web-task-frauds-goes-from-bank-a/cs-to-e-wallets-to-crypto-exchanges/articleshow/102187090.cms</a></figcaption></figure><h3>Simple Tips for Internet Safety</h3><p>Here are some easy-to-follow tips that everyone can understand:</p><h4>Strong Passwords</h4><p>Make your password strong like a fortress! Use a mix of capital letters, small letters, numbers, and special characters. For example, instead of using “fenil123”, use “Fenil@123#2024”.</p><h4>Think Before Clicking</h4><p>Before clicking any link, think carefully like you’re crossing a busy road. Is the sender known to you? Does the message look suspicious? Take time to verify.</p><h4>Keep Personal Information Private</h4><p>Just like you don’t tell strangers your house address, don’t share personal details online. Your Aadhar number, bank details, and family information should be kept safe.</p><h4>Update Your Software</h4><p>Keep your phone and computer software updated, just like you service your bike or car regularly. This helps protect against viruses and hackers.</p><h3>Activities for Safer Internet Day</h3><p>Schools and colleges can organize many interesting activities:</p><ol><li>Cyber safety workshops where experts explain things in simple language</li><li>Quiz competitions about Internet safety</li><li>Poster-making competitions to spread awareness</li><li>Street plays about online safety</li><li>Parent-teacher meetings to discuss children’s online activities</li></ol><h3>Role of Family Members</h3><p>In Indian families, we always help each other. Parents should guide children about safe Internet use, and young people should help older family members understand digital safety. It’s like teaching grandmother to make video calls safely!</p><h3>Conclusion</h3><p>The Internet is like a big mela (fair) — full of exciting things but also requiring careful attention. By following simple safety rules and helping each other, we can make our digital world safer for everyone. Remember, Internet safety is not difficult — it just needs some common sense and awareness.</p><h3>Future Steps</h3><p>As technology keeps changing like the seasons, we must stay updated about new safety measures. Let’s work together to create a better and safer Internet for our beautiful country and the world.</p><blockquote>“A safe Internet is like a clean and healthy environment — it benefits everyone in the community!”</blockquote><p>Fenil Chauhan [Security Researcher]<br>@Rabbit7</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=b3ae39b0af06" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Detailed Explanation of Hyperledger Fabric: Step-by-Step Guide]]></title>
            <link>https://medium.com/@Rabbit7/detailed-explanation-of-hyperledger-fabric-step-by-step-guide-c9afd04a5a44?source=rss-39acb25bed18------2</link>
            <guid isPermaLink="false">https://medium.com/p/c9afd04a5a44</guid>
            <dc:creator><![CDATA[Rabbit7]]></dc:creator>
            <pubDate>Tue, 08 Oct 2024 17:41:50 GMT</pubDate>
            <atom:updated>2025-02-10T02:32:03.085Z</atom:updated>
            <content:encoded><![CDATA[<h3>Overview</h3><p>Hyperledger Fabric is a permissioned blockchain framework designed for enterprise solutions. It allows organizations to create and manage their own blockchain networks with customizable features, making it suitable for various industries such as finance, healthcare, and supply chain management. Below is a step-by-step guide to understanding how to set up and use Hyperledger Fabric.</p><h3>Step 1: Install Prerequisites</h3><p>Before setting up Hyperledger Fabric, ensure you have the following prerequisites installed:</p><ul><li>Docker: Required for containerization of services.</li><li>Docker Compose: Used to define and run multi-container Docker applications.</li><li>Go Programming Language: Needed for writing chaincode (smart contracts).</li><li>Node.js: Useful for developing client applications.</li><li>Hyperledger Fabric Samples: Download the official samples from the Hyperledger Fabric repository.</li></ul><h3>Step 2: Set Up the Development Environment</h3><p>Clone the Hyperledger Fabric Repository:</p><pre>git clone https://github.com/hyperledger/fabric-samples.git <br>cd fabric-samples</pre><p>Install the Hyperledger Fabric binaries and Docker images:</p><pre>curl -sSL https://bit.ly/2ysbOFE | bash -s -- 1.4.4 1.4.4</pre><p>Verify Installation:<br>Check if Docker and Docker Compose are installed correctly:</p><pre>docker --version<br>docker-compose --version</pre><h3>Step 3: Create a New Network</h3><p>Navigate to Sample Networks:<br>Go to one of the sample networks, such as first-network:</p><pre>cd fabric-samples/first-network</pre><p>Start the Network:<br>Use Docker Compose to start the network:</p><pre>./start.sh</pre><p>Check the Network Status:<br>You can check if all containers are running using:</p><pre>docker ps</pre><h3>Step 4: Deploy Chaincode</h3><p>Install Chaincode:<br>Navigate to the chaincode directory and install your chaincode on peers:</p><pre>./install-chaincode.sh</pre><p>Instantiate Chaincode:<br>Instantiate the chaincode on the channel so that it can be used by peers:</p><pre>./instantiate-chaincode.sh</pre><h3>Step 5: Interact with the Network</h3><ol><li>Invoke Transactions:<br>You can invoke transactions using CLI commands or through an SDK (like Node.js or Go). For example, to create a new asset:</li></ol><pre>peer chaincode invoke -o localhost:7050 --ordererTLSHostnameOverride orderer.example.com -C mychannel -n mycc -c &#39;{&quot;function&quot;:&quot;createAsset&quot;,&quot;Args&quot;:[&quot;asset1&quot;,&quot;100&quot;,&quot;Tom&quot;,&quot;0&quot;]}&#39;</pre><p>Query Transactions:<br>To query the state of an asset, use:</p><pre>peer chaincode query -C mychannel -n mycc -c &#39;{&quot;Args&quot;:[&quot;queryAsset&quot;,&quot;asset1&quot;]}&#39;</pre><h3>Step 6: Monitor and Manage the Network</h3><ol><li>Use Hyperledger Explorer (Optional):<br>For a visual representation of your blockchain network, you can set up Hyperledger Explorer to monitor transactions and blocks.</li><li>Stop the Network:<br>When you’re done testing, you can stop all running containers with:</li></ol><pre>./stop.sh</pre><h3>Conclusion</h3><p>Hyperledger Fabric provides a robust framework for building permissioned blockchain networks tailored to enterprise needs. By following these steps, you can set up your own network, deploy chaincode, and interact with it effectively. The modular architecture allows for customization based on specific business requirements, making it a versatile choice for various applications in different industries</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=c9afd04a5a44" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Exploring Hyperledger Tools]]></title>
            <link>https://medium.com/@Rabbit7/exploring-hyperledger-tools-43a2053f3556?source=rss-39acb25bed18------2</link>
            <guid isPermaLink="false">https://medium.com/p/43a2053f3556</guid>
            <category><![CDATA[hyperledger-sawtooth]]></category>
            <category><![CDATA[hyperledger-explorer]]></category>
            <category><![CDATA[hyperledger-usages]]></category>
            <category><![CDATA[hyperledger]]></category>
            <category><![CDATA[hyperledger-tools]]></category>
            <dc:creator><![CDATA[Rabbit7]]></dc:creator>
            <pubDate>Tue, 08 Oct 2024 06:47:47 GMT</pubDate>
            <atom:updated>2024-10-08T06:47:47.202Z</atom:updated>
            <content:encoded><![CDATA[<h3>Overview</h3><p>Hyperledger is an umbrella project that encompasses a variety of open-source blockchain frameworks and tools designed for enterprise solutions. Each tool serves specific purposes, enhancing the development, management, and functionality of blockchain networks. Here’s an exploration of various Hyperledger tools and their usages:</p><h3>1. Hyperledger Fabric</h3><ul><li><strong>Description:</strong> A permissioned blockchain framework that provides a modular architecture.</li><li><strong>Usage: </strong>Ideal for enterprise applications requiring secure transactions and privacy. It supports smart contracts (called chaincode) and allows for customizable consensus mechanisms.</li><li><strong>Key Features:</strong></li><li>Role-based access control</li><li>Confidential transactions</li><li>Scalability for high transaction throughput</li></ul><h3>2. Hyperledger Sawtooth</h3><ul><li><strong>Description:</strong> An enterprise-level blockchain platform designed to support various consensus algorithms.</li><li><strong>Usage:</strong> Suitable for building and deploying distributed ledger applications, particularly in industries requiring scalability and flexibility.</li><li><strong>Key Features:</strong></li><li>Dynamic consensus mechanism (hot-swappable)</li><li>Parallel transaction execution to enhance performance</li><li>Ethereum contract compatibility</li></ul><h3>3. Hyperledger Indy</h3><ul><li><strong>Description:</strong> A distributed ledger specifically designed for decentralized identity management.</li><li><strong>Usage: </strong>Provides tools and libraries to create self-sovereign identities, giving users control over their personal data.</li><li><strong>Key Features:</strong></li><li>Secure storage of identity credentials</li><li>Third-party validation of identities</li><li>Focus on privacy and security</li></ul><h3>4. Hyperledger Iroha</h3><ul><li><strong>Description:</strong> A simple blockchain platform designed for infrastructure projects.</li><li><strong>Usage:</strong> Often used in projects requiring identity management and asset tracking.</li><li><strong>Key Features:</strong></li><li>Easy integration with existing systems</li><li>User-friendly design with a focus on mobile applications</li><li>Built-in support for asset management</li></ul><h3>5. Hyperledger Burrow</h3><ul><li><strong>Description: </strong>A permissioned blockchain framework that includes a smart contract interpreter.</li><li><strong>Usage:</strong> Facilitates the execution of smart contracts in a permissioned environment, suitable for cross-industry applications.</li><li><strong>Key Features:</strong></li><li>BFT (Byzantine Fault Tolerance) consensus algorithm</li><li>Integration with other Hyperledger frameworks</li></ul><h3>6. Hyperledger Cello</h3><ul><li><strong>Description:</strong> A blockchain management system that provides Blockchain-as-a-Service (BaaS).</li><li><strong>Usage:</strong> Helps organizations create, manage, and operate multiple blockchain networks easily.</li><li><strong>Key Features:</strong></li><li>Lifecycle management of blockchain networks</li><li>Customizable environments for deploying services</li><li>Resource scaling through dashboards</li></ul><h3>7. Hyperledger Caliper</h3><ul><li><strong>Description:</strong> A benchmarking tool for measuring the performance of blockchain implementations.</li><li><strong>Usage:</strong> Allows developers to evaluate different blockchain frameworks based on predefined use cases.</li><li><strong>Key Features:</strong></li><li>Performance metrics such as transaction throughput and latency</li><li>Support for multiple Hyperledger frameworks</li></ul><h3>8. Hyperledger Explorer</h3><ul><li><strong>Description:</strong> A web-based application that provides a user interface for interacting with blockchain networks.</li><li><strong>Usage:</strong> Enables users to view transaction details, blocks, and network status without needing deep technical knowledge.</li><li><strong>Key Features:</strong></li><li>Visual representation of blockchain operations</li><li>Transaction searching and filtering capabilities</li><li>User management functionalities</li></ul><h3>Conclusion</h3><p>Hyperledger offers a rich ecosystem of tools tailored to meet the diverse needs of enterprises looking to implement blockchain technology. From managing decentralized identities with Hyperledger Indy to benchmarking performance with Hyperledger Caliper, each tool plays a vital role in enhancing the capabilities of blockchain solutions. Understanding these tools allows organizations to choose the right components for their specific use cases, ensuring successful implementation and operation of blockchain networks.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=43a2053f3556" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Understanding Blockchain Consensus Mechanisms]]></title>
            <link>https://medium.com/@Rabbit7/understanding-blockchain-consensus-mechanisms-865d538df48a?source=rss-39acb25bed18------2</link>
            <guid isPermaLink="false">https://medium.com/p/865d538df48a</guid>
            <category><![CDATA[directed-acyclic-graph]]></category>
            <category><![CDATA[proof-of-work]]></category>
            <category><![CDATA[consensus-mechanism]]></category>
            <category><![CDATA[blockchain]]></category>
            <category><![CDATA[proof-of-authority]]></category>
            <dc:creator><![CDATA[Rabbit7]]></dc:creator>
            <pubDate>Tue, 08 Oct 2024 06:12:30 GMT</pubDate>
            <atom:updated>2024-10-08T06:12:30.219Z</atom:updated>
            <content:encoded><![CDATA[<h3>Overview of Consensus Mechanisms</h3><p>Consensus mechanisms are essential protocols in blockchain technology that enable distributed networks to agree on a single state of the ledger. They ensure that all nodes in a network reach an agreement on the validity of transactions, which is crucial for maintaining the integrity and security of the blockchain. The choice of consensus mechanism can significantly impact the performance, scalability, and decentralization of a blockchain network.</p><h3>Types of Consensus Mechanisms</h3><p>Various consensus mechanisms have been developed, each with unique strengths and weaknesses. Below is a comparison of some prominent types:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/753/1*dhdoGg7VnDpXJxkXPVRrqQ.png" /><figcaption>Types of Consensus Mechanisms</figcaption></figure><h3>Detailed Analysis</h3><p><strong>Proof of Work (PoW)</strong></p><ul><li><strong>Mechanism:</strong> In PoW, miners compete to solve cryptographic puzzles, with the first to solve it allowed to add a new block to the blockchain.</li><li><strong>Advantages: </strong>It is highly secure due to the computational power required to alter any part of the blockchain.</li><li><strong>Disadvantages: </strong>PoW consumes significant energy and has slower transaction times compared to other mechanisms.</li></ul><p><strong>Proof of Stake (PoS)</strong></p><ul><li><strong>Mechanism: </strong>Validators are selected based on their stake in the network, meaning their ownership of cryptocurrency.</li><li><strong>Advantages: </strong>PoS is more energy-efficient and can process transactions faster than PoW.</li><li><strong>Disadvantages: </strong>There is a risk of centralization as those with more coins have greater influence over the network.</li></ul><p><strong>Delegated Proof of Stake (DPoS)</strong></p><ul><li><strong>Mechanism: </strong>Coin holders elect delegates who validate transactions on their behalf.</li><li><strong>Advantages:</strong> DPoS can achieve high transaction speeds and encourages community participation.</li><li><strong>Disadvantages:</strong> It can lead to centralization if a small group controls most votes.</li></ul><p><strong>Practical Byzantine Fault Tolerance (PBFT)</strong></p><ul><li><strong>Mechanism: </strong>PBFT requires consensus from a predetermined number of validators before a transaction is confirmed.</li><li><strong>Advantages: </strong>It offers high throughput and low latency, making it suitable for permissioned blockchains.</li><li><strong>Disadvantages: </strong>Its reliance on trusted validators makes it less secure in open networks where nodes cannot be trusted.</li></ul><p><strong>Directed Acyclic Graphs (DAG)</strong></p><ul><li><strong>Mechanism: </strong>In DAG systems, each transaction confirms previous ones, allowing multiple transactions to be processed simultaneously.</li><li><strong>Advantages: </strong>This structure allows for high scalability and quick confirmation times.</li><li><strong>Disadvantages: </strong>The complexity and relatively new nature make it less established than traditional blockchains.</li></ul><p><strong>Proof of Authority (PoA)</strong></p><ul><li><strong>Mechanism: </strong>Only approved validators can create new blocks, making it suitable for private networks.</li><li><strong>Advantages: </strong>It is efficient and requires fewer resources than PoW or PoS.</li><li><strong>Disadvantages:</strong> The centralized nature raises concerns about trust and accountability among validators.</li></ul><h3>Conclusion</h3><p>The choice of consensus mechanism depends largely on the specific requirements and goals of the blockchain application being developed. While PoW offers robust security, its energy demands make it less favorable for new projects focused on efficiency and speed. Conversely, PoS and its variants provide quicker processing times but may lead to centralization issues if not managed correctly. Emerging technologies like DAGs present innovative solutions but come with their own challenges regarding adoption and trustworthiness. Understanding these mechanisms allows developers and stakeholders to choose the most appropriate one for their needs while balancing trade-offs between security, efficiency, and decentralization.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=865d538df48a" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[My Journey with ISO 27001: A Cybersecurity Analyst Perspective ]]></title>
            <link>https://medium.com/@Rabbit7/my-journey-with-iso-27001-a-cybersecurity-analyst-perspective-0ab7d00ed8e1?source=rss-39acb25bed18------2</link>
            <guid isPermaLink="false">https://medium.com/p/0ab7d00ed8e1</guid>
            <category><![CDATA[iso-27001-certification]]></category>
            <category><![CDATA[information-security]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[iso-27001-standard]]></category>
            <category><![CDATA[cybersecurity-analyst]]></category>
            <dc:creator><![CDATA[Rabbit7]]></dc:creator>
            <pubDate>Fri, 24 May 2024 03:50:00 GMT</pubDate>
            <atom:updated>2024-05-24T03:50:00.893Z</atom:updated>
            <content:encoded><![CDATA[<p>Hello, world! 🌍 💻🔒 My name is <a href="https://www.linkedin.com/in/itfenil/">Fenil Chauhan</a>, and I’m an intern cybersecurity analyst that is totally in love with things cybersecurity. The worldwide standard ISO 27001, which outlines the specifications for an Information Security Management System (ISMS), is what I’m working on right now. Thus far, the journey has been fascinating, and I can’t wait to share what I’ve learned with you! 😊</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/640/0*qSg72R3QHejfli3j" /></figure><h3>Discovering ISO 27001 🕵️‍♂️</h3><p>Organizations all across the world are adopting ISO 27001, also referred to as ISO/IEC 27001, as a means of demonstrating a strong cybersecurity program. The Geneva, Switzerland-based ISO organization has released more than 20,000 standards in a range of disciplines, including IT security. 🌐 <br> <br>It is not a new standard, ISO 27001 is. Its foundation was the British Standard 7799, which was released in 1995. Two components of this standard were accepted by ISO. In November 2005, one section — which covered the implementation of an ISMS — became ISO/IEC 27001 compliant. In July 2007, the other section — which concentrated on ISMS best practices — became ISO/IEC 27002. 📚</p><h3>Breaking Down the ISO 27001 Standard 🔍</h3><p>The ISO 27001 standard is a guide on how to manage an information security program. It’s divided into two main parts:</p><ol><li><strong>Sections Four through Ten:</strong> The fundamental requirements of the standard are outlined in these paragraphs. They provide the idea of an information security management system, or ISMS, which is a management system rather than a computer system. Creating the ISMS, implementing and operating the ISMS, monitoring and reviewing the ISMS, and maintaining and improving the ISMS are the four primary components of the ISMS’s never-ending security management cycle. These components align with the traditional Plan-Do-Check-Act (PDCA) approach to continuous development. 🔄</li><li><strong>Information Security Controls in Annex A Citation:</strong> To ensure compliance with ISO 27001, a business must adhere to the controls outlined in this section. Annex A contains four control groups, totaling ninety-three controls. All 93 of these controls are described in ISO 27002 and their compliance requirements in detail. 📝</li></ol><h3>Why Build an ISO 27001-Compliant Cybersecurity Program? 🤔</h3><p>Building an ISO 27001 compliant cybersecurity program can be beneficial for organizations, even if they don’t pursue certification. Here are the key points:</p><ol><li><strong>Improving Security:</strong> Complying with ISO 27001 helps improve and validate an organization’s security program. It focuses on continuous improvement, risk management, and includes 93 security controls. 💪</li><li><strong>Demonstrating Commitment:</strong> Compliance can assure leaders and other interested parties that the organization follows good security practices. 🏅</li><li><strong>Certification Advantages:</strong> Some organizations choose to get ISO 27001 certified by an authorized third party. This certification demonstrates that the organization has the necessary controls in place to protect sensitive information. It’s particularly important for organizations handling sensitive information for others. 🛡️</li><li><strong>Competitive Advantage:</strong> As an internationally recognized standard, ISO 27001 can provide a competitive edge, especially for businesses expanding globally. It attracts customers who prefer companies with robust security practices. 🌎</li><li><strong>Marketing Benefits:</strong> Once certified, the organization receives a certificate that can be shared with others to show conformity with ISO 27001. The certification can also be displayed on the organization’s website and marketing materials, potentially improving the organization’s image and attracting more business. 📈</li></ol><h3>ISO 27001:2013 and ISO 27001:2022 Differences and Mapping 🔄</h3><p>In 2022, the ISO 27001 standard was updated to streamline and simplify its implementation, making it more effective at protecting information. Here are the key changes:</p><ol><li><strong>Main Clauses (4–10):</strong> Minor changes were made, including the addition of clause 6.3, which requires explicit planning for changes to the ISMS.</li><li><strong>Annex A Controls:</strong> Significant changes were made here. The number of controls decreased from 114 to 93. Of the original controls, 35 remained unchanged, 23 were renamed, 57 were merged into 24, and 11 new controls were added. These new controls include Information security for use of cloud services, ICT readiness for business continuity, Threat intelligence, Physical security monitoring, Configuration management, Information deletion, Data masking, Data leakage prevention, Monitoring activities, Web filtering, and Secure coding.</li><li><strong>Control Categories:</strong> The previous 14 sections were reorganized into four categories: organizational, people, physical, and technological.</li></ol><p>These updates aim to make the ISO 27001 standard easier to implement and more effective at protecting information. 🎯</p><p>As I continue my journey with ISO 27001, I’m excited to see where it leads. The world of cybersecurity is ever-evolving, and I’m thrilled to be a part of it. Stay tuned for more updates on my journey! 🚀</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=0ab7d00ed8e1" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Report on Amass Bug Bounty Recon Tool]]></title>
            <link>https://medium.com/@Rabbit7/report-on-amass-bug-bounty-recon-tool-a8f8ea54cfaa?source=rss-39acb25bed18------2</link>
            <guid isPermaLink="false">https://medium.com/p/a8f8ea54cfaa</guid>
            <category><![CDATA[bug-bounty]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[bug-bounty-program]]></category>
            <category><![CDATA[recon-tool]]></category>
            <category><![CDATA[responsible-disclosure]]></category>
            <dc:creator><![CDATA[Rabbit7]]></dc:creator>
            <pubDate>Tue, 24 Oct 2023 07:52:44 GMT</pubDate>
            <atom:updated>2023-10-24T07:52:44.593Z</atom:updated>
            <content:encoded><![CDATA[<p><strong>Introduction</strong></p><p>Amass is an open-source, versatile tool for information gathering and network mapping during the reconnaissance phase of security testing. It is widely used by bug bounty hunters, penetration testers, and security researchers to discover and enumerate assets, subdomains, and other potential attack vectors.</p><p>In this report, we will provide an overview of Amass, discuss its key features, and provide example code for conducting bug bounty reconnaissance using this tool.</p><p><strong>Key Features of Amass</strong></p><p>Amass offers a wide range of features that make it a powerful tool for bug bounty recon:</p><p>· <strong>Subdomain Enumeration:</strong> Amass is known for its ability to efficiently discover subdomains associated with a target domain, often uncovering hidden assets that may be overlooked.</p><p>· <strong>Data Source Integration: </strong>It can pull data from a variety of sources, including DNS, web archives, certificates, and more. This feature increases the breadth and depth of the reconnaissance process.</p><p>· <strong>Active Scanning:</strong> Amass supports active scanning methods like DNS brute forcing, port scanning, and HTTP probing to uncover additional assets.</p><p>· <strong>Customizable Output:</strong> The tool provides options to format and output the discovered data in different formats, making it easy to integrate with other security tools or workflows.</p><p>· <strong>Extensibility:</strong> Amass can be extended with custom data sources and other functionalities, making it a versatile choice for tailored bug bounty reconnaissance.</p><p>· <strong>Integration with Other Tools:</strong> It can be integrated with other tools such as Subfinder, Sublist3r, and MassDNS to enhance the reconnaissance process further.</p><p><strong>Example Code for Bug Bounty Recon with Amass</strong></p><p>Here’s an example code snippet that demonstrates how to use Amass for bug bounty reconnaissance.</p><p>Ensure you have Amass installed on your system before executing this</p><p><strong>code:</strong></p><p># Run Amass to discover subdomains and save results to a file<br> amass enum -d example.com -o amass_results.txt</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/750/1*XprdTXsiPjETtD3fifmw1Q.png" /></figure><p>In this example:</p><p>§ <strong>-d</strong> specifies the target domain for reconnaissance.</p><p>§ <strong>-o</strong> indicates that the results should be saved to a file called amass_results.txt.</p><p><strong>Conclusion</strong></p><p>Amass is a powerful and versatile tool for bug bounty reconnaissance, helping security professionals and bug bounty hunters discover assets and subdomains associated with a target domain. By leveraging its extensive feature set and combining it with other tools, you can conduct thorough reconnaissance to identify potential attack vectors and vulnerabilities, contributing to a successful bug bounty program.</p><p>References:</p><p><a href="https://github.com/OWASP/Amass">Amass documentation</a></p><p>by_Fenil Chauhan <a href="https://medium.com/u/39acb25bed18">Rabbit7</a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=a8f8ea54cfaa" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[How to Get Started in Bug Bounty Hunting 2025]]></title>
            <link>https://medium.com/@Rabbit7/how-to-get-started-in-bug-bounty-hunting-2023-ef9eaf37a644?source=rss-39acb25bed18------2</link>
            <guid isPermaLink="false">https://medium.com/p/ef9eaf37a644</guid>
            <category><![CDATA[bug-bounty-tips]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[cyber]]></category>
            <category><![CDATA[bug-bounty]]></category>
            <category><![CDATA[recon]]></category>
            <dc:creator><![CDATA[Rabbit7]]></dc:creator>
            <pubDate>Tue, 24 Oct 2023 07:47:01 GMT</pubDate>
            <atom:updated>2025-07-24T11:53:34.464Z</atom:updated>
            <content:encoded><![CDATA[<p>Bug bounty hunting is a great way to earn money while helping organizations improve their security. It’s also a great way to learn new security skills and build a reputation in the infosec community.</p><p>If you’re interested in getting started in bug bounty hunting, here are a few tips:</p><p>· <strong>Learn the basics of web security.</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/867/1*uCr3MnPUqgsqELgGk5uPyg.png" /></figure><p>This includes understanding common vulnerabilities such as SQL injection, cross-site scripting, and insecure direct object references. There are many resources available online and in libraries to help you learn web security.</p><p>· <strong>Choose a bug bounty platform.</strong></p><p>There are many different bug bounty platforms available, such as HackerOne, Bugcrowd, and Synack. Each platform has its own set of rules and requirements, so be sure to read them carefully before signing up.</p><p>· <strong>Select a program to work on.</strong></p><p>Once you’ve signed up for a bug bounty platform, you can start browsing the list of programs available. Choose a program that interests you and that you think you have a good chance of finding bugs for.</p><p>· <strong>Start testing!</strong></p><p>Once you’ve selected a program, you can start testing the website or application. Be sure to follow the program’s rules and guidelines, and be respectful of the organization’s property.</p><p>· <strong>Report any bugs you find.</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/863/1*nCyH5Vw3R0SjavEfiH6dYQ.png" /></figure><p>If you find a bug, be sure to report it to the organization according to the program’s guidelines. Be sure to include detailed information about the bug, such as how to reproduce it and the impact it could have.</p><p><strong>Here are a few additional tips for success in bug bounty hunting:</strong></p><p>· <strong>Be persistent.</strong></p><p>Don’t get discouraged if you don’t find any bugs right away. It takes time and practice to become a successful bug bounty hunter.</p><p>· <strong>Be creative.</strong></p><p>Don’t be afraid to think outside the box when looking for bugs. The best bug bounty hunters are the ones who can find creative ways to exploit vulnerabilities.</p><p>· <strong>Be ethical.</strong></p><p>Bug bounty hunting is all about helping organizations improve their security. Don’t abuse the programs or exploit vulnerabilities for personal gain.</p><p>Bug bounty hunting can be a rewarding experience, both financially and professionally. If you’re interested in getting started, be sure to follow the tips above and learn as much as you can about web security.</p><p><strong>Here are some additional tips for beginners:</strong></p><p>· <strong>Start with low-hanging fruit.</strong> There are many common vulnerabilities that are easy to find. Focus on these vulnerabilities first to build your confidence and experience.</p><p>· <strong>Use tools and resources.</strong> There are many tools and resources available to help bug bounty hunters. For example, you can use web scanners to identify common vulnerabilities, and you can use fuzzers to generate random inputs to test for unexpected behavior.</p><p>· <strong>Collaborate with other hunters.</strong> There are many online communities where bug bounty hunters can collaborate and share information. Joining a community is a great way to learn from others and get help when you need it.</p><p>Remember, bug bounty hunting is a marathon, not a sprint. It takes time and practice to become a successful hunter. But if you’re willing to put in the work, it can be a very rewarding experience.</p><p>By_ Fenil Chauhan <a href="https://medium.com/u/39acb25bed18">Rabbit7</a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=ef9eaf37a644" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Implementing Natural Language Processing using Microsoft Azure]]></title>
            <link>https://medium.com/@Rabbit7/implementing-natural-language-processing-using-microsoft-azure-8078cd7c7f7e?source=rss-39acb25bed18------2</link>
            <guid isPermaLink="false">https://medium.com/p/8078cd7c7f7e</guid>
            <dc:creator><![CDATA[Rabbit7]]></dc:creator>
            <pubDate>Sun, 11 Jun 2023 09:16:53 GMT</pubDate>
            <atom:updated>2023-06-11T09:16:53.366Z</atom:updated>
            <content:encoded><![CDATA[<p><strong>Problem Statement:</strong></p><p>Natural Language Processing (NLP) is a field of artificial intelligence that deals with the interaction between computers and human languages. NLP is used in various applications such as chatbots, sentiment analysis, language translation, and speech recognition. However, implementing NLP can be a complex process that involves collecting and processing large amounts of data.</p><p><strong>Solution/Architecture:</strong></p><p>Microsoft Azure provides a range of tools and services that can be used to implement NLP solutions. The architecture of the solution involves using Azure services such as</p><p><strong>Azure Cognitive Services:</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/311/1*n5NCupku-gOFa6AJQiapiQ.png" /><figcaption>Azure Cognitive Services</figcaption></figure><p>Azure Functions to collect and process NLP data. The data can then be analyzed and visualized using Power BI.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/640/1*cu1Cd_1losw--FIFDU-Bsw.png" /><figcaption>Figure 1 Architecture</figcaption></figure><p><strong>Technical Details and Implementation of the Solution:</strong></p><p>To implement NLP using Microsoft Azure, we need to follow the following steps:</p><ol><li><strong>Data Collection:</strong> The first step is to collect the data that we want to analyze. We can use Azure Cognitive Services to collect data from various sources such as social media, email, and chatbots.</li><li><strong>Data Processing:</strong> Once the data is collected, it needs to be processed to extract valuable insights. We can use Azure Machine Learning to pre-process and analyze the data. For example, we can use machine learning algorithms to identify key phrases and sentiments within the data.</li><li><strong>Functionality Development: </strong>We can use Azure Functions to develop the functionality required for our NLP application. For example, we can use Azure Functions to develop a chatbot that uses NLP to understand and respond to user queries.</li><li><strong>Data Visualization:</strong> Power BI can be used to create interactive dashboards that enable users to visualize the data and gain insights into the NLP model’s performance. Dashboards can be customized to display information on key metrics such as sentiment analysis, key phrases, and language translation.</li></ol><h4><strong>Challenges in Implementing the Solution:</strong></h4><p>Implementing NLP using Microsoft Azure comes with a few challenges. One significant challenge is data quality. NLP requires large amounts of data, and the data needs to be clean, accurate, and relevant to the application’s purpose. It is essential to ensure that the data is standardized, validated, and cleaned before processing and analysis.</p><p>Another challenge is model accuracy. The accuracy of the NLP model depends on the quality and relevance of the data used to train it. It is essential to ensure that the NLP model is trained on a diverse dataset that is relevant to the application’s purpose.</p><p><strong>Business Benefit:</strong></p><p>Implementing NLP using Microsoft Azure can provide numerous benefits to businesses, including:</p><ul><li><strong>Improved Customer Experience:</strong> NLP can be used to develop chatbots that can understand and respond to user queries, leading to improved customer experience.</li><li><strong>Increased Efficiency:</strong> By analyzing data using NLP, businesses can identify patterns and insights that can help improve overall efficiency.</li><li><strong>Competitive Advantage:</strong> NLP can be used to gain insights into customer behavior and market trends, providing a competitive advantage.</li><li><strong>Reduced Costs:</strong> NLP can help automate processes such as language translation, leading to reduced costs and improved productivity.</li></ul><p><strong>Conclusion:</strong></p><p>Implementing NLP using Microsoft Azure can help businesses develop powerful applications that can understand and analyze human language. Microsoft Azure provides a range of tools and services that make it easy to collect, process, and analyze NLP data, enabling businesses to gain insights into customer behavior and market trends. However, it is essential to ensure that the data used to train the NLP model is clean, accurate, and relevant to the application’s purpose.</p><p><strong>References:</strong></p><ul><li><a href="https://learn.microsoft.com/en-us/azure/architecture/solution-ideas/articles/website-content-tag-suggestion-with-deep-learning-and-nlp">Suggest content tags with NLP using deep learning - Azure Solution Ideas</a></li><li><a href="https://learn.microsoft.com/en-us/azure/architecture/solution-ideas/articles/website-content-tag-suggestion-with-deep-learning-and-nlp">Suggest content tags with NLP using deep learning - Azure Solution Ideas</a></li><li><a href="https://learn.microsoft.com/en-us/azure/architecture/example-scenario/ai/many-models-machine-learning-azure-machine-learning">Many models ML with Azure Machine Learning - Azure Example Scenarios</a></li></ul><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=8078cd7c7f7e" width="1" height="1" alt="">]]></content:encoded>
        </item>
    </channel>
</rss>