Top Songs By H-A-M(Hustle-And-Motivate)
Credits
KOMPOSITION UND LIEDTEXT
Hamlet Bent Jr
Texte
PRODUKTION UND TECHNIK
Track Pros
Produzent:in
Lyrics
We use Signatures and heuristics to scan the digital highways,
And get pay.
Move information in different states.
Using vps to keep the paper safe.
Carvin a subnets like 192 to 168
Lots of IPs like a /8.
Can you relate?
As the phishers plant their digital bait,
those emails, I don't take.
Cisco email security appliance see's the fakes.
Spam gets sent via mail relays.
Bandwidth pipelines look like digital freeways.
I arm my self in digit many ways,
Knowledge is great.
My voice sounds clear and makes the speaker vibrate.
Bluetooth headphones in the zone,
I rhyme and get cake.
Beware of the internet dates.
Profile that seems to be fake.
Could be a scam, lookin for ya mate.
Can you relate?
I study social engineering ways to penetrate the mind gate.
Your worst fears could appear.
Payloads of Ransom and malware,
Sittin on your network until the ransomware appears.
Deliver the message, digital ransom note appears.
They want the pay in days, not weeks, not months, not even years.
Like a deer hunter stalks its deer,
Reconnaissance was done, this is clear.
Log files indicate that the hackers are here.
Indicators of compromises,
Situations test your career.
Not always seen by a network administrators.
Now your subject to network violators.
Incident response teams and cyber investigators.
Explain the situations gotten a bit major.
Ransom note's appear a one pager,
Can't be traced, digital bit coin caper.
Locked down critical systems in this caper.
Like Bruce Willis staring out the windows of the sky scraper.
I'm hit to numbers like a sky pager.
Luckily,
Some units not affected because of OS diversity.
Basically,
Windows units were chosen because of popularity.
Proceeded to fail over to Linux USBs,
Then checked out backups stored remotely.
They were good, next strategy,
we reload OS images from DVDs.
Under siege from digital thieves.
Do the feds have to visit your scene?
Was there a breach?
Robberies held with digital heat,
Meta sploit payload deliveries.
They got control of your computers internally,
Using motherboard circuitry against your facilities.
Know what I mean?
Make temps rise like a HVAC,
Hot as 90 degrees, now the enemy is time you see.
Theoretically this is how bad it could be.
Think nest thermostats
Web browser be Google chrome.
Search engine optimization,
Websites be well known,
BrowHard DNS registrations,
Whois and dig results get shown,
CLI elements in Linux environments,
propagation across the cyber nation.
Powerin up laptops, saving energy for hibernation,
I'm checkin Start of authority records,
With entries about times to live in milliseconds.
Quad 75 Comcast servers, Google's four 8s,
some DNS servers might have heard
Can you relate?
I'm talking changes to A records, MX for SMTP,
Break down the acronyms efficiently,
IMAP protocol basically for mail delivery.
It's about newer than POP3.
Encryption technology use PGP,
That's basically pretty good privacy.
Makes it so they can't read messages easily.
PKI public infrastructure capa... capabilities,
We swap keys,
Check the hash values on digital certificates please.
Secure the HTTP, SSL and 443,
Unencrypted that's port 80.
Telnet sparingly, that's network port 23
Check the time with NTP, network port 123,
And then there's SNMP, using community strings and encryption in version 3.
Remotely control desktops with RDP,
Phones get registered with SIP,
That's port 5060
Anyways, that's enough about me talking technology,
Signing off HAM to the LET
Be that new emcee for 2023
That's Doing it here for BrowHard county.
Written by: Hamlet Bent Jr