Monday, January 30, 2023
  • Advertise With Us
  • Write For Us
  • Contact Us
  • About Us
  • Editorial Calendar
Download Free Magazine
The Cyber Express
Ransomware 2023 Report
  • Magazine
  • Firewall Daily
    • All
    • Dark Web News
    • Data Breach News
    • Hacks
    • Ransomware
    • Vulnerabilities
    Westmont Hospitality

    ALPHV/BlackCat Ransomware Gang Attacks Westmont Hospitality Group

    cybersecurity

    ‘You are Essentially Funding Cybercriminals When You Pay Ransom’

    Dr Pepper Russian Branch

    Data Breach at Dr Pepper Russian Branch, Mystery Hacker Steals Confidential Info

    Amadey Botnet

    Old Bot in New Bottle: Amadey Botnet Back in Action Via Phishing Sites

    Verizon

    Verizon Customer Data for Sale on Dark Web, New Data Breach Suspected

    GoTo Confirms User Data Stolen With Encryption Key

    GoTo Confirms User Data Stolen With Encryption Key

    HIVE Ransomware

    Hive Ransomware Servers Taken Down in FBI-led Global Law Enforcement Action

    porsche nft

    Porsche NFT Hits Pit Stop, Fake NFT Sale On With Malvertising and Fraud Domains

    Hilton Hotels

    Hilton Hotels Loyalty Program Data Breached, Customer Info for Sale

  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    TRAI

    TRAI Asked to Involve MoD in Drafting Big Data Regulations & Policies

    cybersecurity

    Cybersecurity incidents may soon be ‘uninsurable’

    Australia

    Australia Ropes in Tech Veterans to Set Up Cyber Action Plan

    Active Directory

    Prevent Ransomware: Save the Active Directory

    Privacy Penalty Bill

    Privacy Penalty Bill: Australian Parliament Approves Heavy Fines

    Zero Trust Strategy

    US Department of Defense to Embrace Zero Trust Strategy

    browser hijackers

    Researchers Find Browser Hijackers on Google Chrome Web Store

    DORA proposal

    DORA Proposal for Cybersecurity Awaits Full Approval by Council and ESAs

    Privacy penalty bill

    Australia Privacy Penalty Bill 2022: Pay a $50 Million Fine for Data Breaches

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business News
    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Webinars
    • World CyberCon Middle East 2023
    • Endorsed Events
  • Advertise
No Result
View All Result
The Cyber Express
  • Magazine
  • Firewall Daily
    • All
    • Dark Web News
    • Data Breach News
    • Hacks
    • Ransomware
    • Vulnerabilities
    Westmont Hospitality

    ALPHV/BlackCat Ransomware Gang Attacks Westmont Hospitality Group

    cybersecurity

    ‘You are Essentially Funding Cybercriminals When You Pay Ransom’

    Dr Pepper Russian Branch

    Data Breach at Dr Pepper Russian Branch, Mystery Hacker Steals Confidential Info

    Amadey Botnet

    Old Bot in New Bottle: Amadey Botnet Back in Action Via Phishing Sites

    Verizon

    Verizon Customer Data for Sale on Dark Web, New Data Breach Suspected

    GoTo Confirms User Data Stolen With Encryption Key

    GoTo Confirms User Data Stolen With Encryption Key

    HIVE Ransomware

    Hive Ransomware Servers Taken Down in FBI-led Global Law Enforcement Action

    porsche nft

    Porsche NFT Hits Pit Stop, Fake NFT Sale On With Malvertising and Fraud Domains

    Hilton Hotels

    Hilton Hotels Loyalty Program Data Breached, Customer Info for Sale

  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    TRAI

    TRAI Asked to Involve MoD in Drafting Big Data Regulations & Policies

    cybersecurity

    Cybersecurity incidents may soon be ‘uninsurable’

    Australia

    Australia Ropes in Tech Veterans to Set Up Cyber Action Plan

    Active Directory

    Prevent Ransomware: Save the Active Directory

    Privacy Penalty Bill

    Privacy Penalty Bill: Australian Parliament Approves Heavy Fines

    Zero Trust Strategy

    US Department of Defense to Embrace Zero Trust Strategy

    browser hijackers

    Researchers Find Browser Hijackers on Google Chrome Web Store

    DORA proposal

    DORA Proposal for Cybersecurity Awaits Full Approval by Council and ESAs

    Privacy penalty bill

    Australia Privacy Penalty Bill 2022: Pay a $50 Million Fine for Data Breaches

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business News
    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Webinars
    • World CyberCon Middle East 2023
    • Endorsed Events
  • Advertise
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Cybersecurity News

ChatGPT Codes, and Troubleshoots When Stuck, Finds Researcher!   

ChatGPT-made programs find quick way to get a list of active users for an organization’s SaaS apps 

Chandu Gopalakrishnan by Chandu Gopalakrishnan
December 20, 2022
in Cybersecurity News
0
ChatGPT
615
SHARES
3.4k
VIEWS
Share on LinkedInShare on Twitter

Since the end of November, when OpenAI debuted the wildly popular ChatGPT, observers on all sides have been concerned about the impact AI-driven content creation would have, particularly in the field of cybersecurity. Indeed, many experts are afraid that generative AI solutions would make crimes more accessible. 

While security teams can use ChatGPT for defensive applications like as code testing, getting the solution right is not always easy, says Patrick Garrity, VP of Marketing at Nucleus Security.  

You might also like

ALPHV/BlackCat Ransomware Gang Attacks Westmont Hospitality Group

Hive Ransomware Servers Taken Down in FBI-led Global Law Enforcement Action

League of Legends Source Code Up For Sale a Day After $10m Ransom Demand, Riot Games Confirm Leak

As part of his Hoodwink project, he tried to use ChatGPT to get a list of active users for an organizations SaaS apps that could help identify user licenses that go unused. The journey was equally impressive as the results, he told The Cyber Express. 

Necessity, curiosity, invention 

“Hoodwink is a weekend project I created to explore ChatGPT. The scripts created from the project generate a list that allows organizations to better understand and rightsize their SaaS licensing and security needs,” he said. 

A week ago, he received a rather excessive bill from a SaaS app for additional user licenses that felt excessive. That got him thinking about a quick way to get a list of active users for an organization’s SaaS apps that could help identify user licenses that go unused.  

“I asked several friends across the technology community and seemingly no one could answer this question, but nearly everyone provided feedback that having this information accessible would be useful. A few even theorized having this information could potentially save organizations billions of dollars,” he said.  

The need here was to analyze application usage using user authentication logs from Duo Security, Okta, Microsoft Azure and Google Workspace. After completing a rudimentary flow chart, he reached out to a few of his developer friends, but most were busy. As a last resort, he turned to ChatGPT. 

Get, set, go, get back again! 

After reviewing the authentications logs from Duo Security to better understand what information he could use to generate the desired scripts, he made a digital concept of the project: a GoogleSheet!

The first command “write a python script that takes duo security logs and tells me the number of users that logged into an application over the past 90-days” gave a script. It did not work.

chatgpt 

Curiously, he turned to ChatGPT itself for troubleshooting. ChatGPT was able to point him in the right direction where he learned how to troubleshoot the script, leading him to the conclusion that the script was correct but the variables in the script were not. 

A set of trials and changes followed, till it worked. 

“The full process from start to finish took my somewhere between 4-8 hours from idea to having a working python script which might seem like a lot for a developer but the reality is I’m not a developer and wouldn’t know where to start,” he conceded. 

“Most the time spent working on this was actually spent configuring, learning how to run the python client on my mac and setting up test environments so I could validate the scripts work.” 

TCE took a look at the impressive end results: 

Hoodwink Duo uses Duo Security authentication logs to identify how many unique active users accessed an application in the past 180-days.  

Hoodwink Duo Bypass uses Duo Security authentication logs to identify users that successfully authenticated using a bypass authentication method.  

Hoodwink Duo SMS Users uses Duo Security authentication logs to identify users that successfully authenticated using the SMS authentication method.  

Hoodwink Okta uses Okta authentication logs to identify how many unique active users accessed an application in the past 180-days.  

Hoodwink Okta Country uses Okta authentication logs to identify how many successful authentication attempts have been successful per country. 

Barebones and prospects 

When asked about to list the basic steps of the entire process, Garrity gave us this: 

  1. I wrote down my idea
  2. I mocked up an example of what I wanted to create in a note pad
  3. I researched duo logs to determine if the data I needed was available
  4. I asked ChatGPT to create a script
  5. I tested the script, and it didn’t work
  6. I went back to ChatGPT and communicated the error, and it suggested a modified script
  7. The script worked but had a different result than expected
  8. I communicated this back to ChatGPT and it generated a modified script
  9. I retested the script, and it generated the expected outcome

“The additional scripts took significantly less time to create because I knew what questions to ask and how to reiterate fast,” he told TCE. 

While the results are impressive, it entirely depends on the intention of the user. ChatGPT has been red-listed for the possibility of writing anything, from impeccable phishing email to malware and ransomware. 

Explicitly mal intentional commands are blocked, but they can be easily circumvented with a host of tasks produces results that eventually add up to the desired malware, warned Picus Security co-founder Suleyman Ozarslan.  

Daniel Von Fange, a distributed systems engineer who is an active contributor to many cryptocurrency code repositories, recently outed a bogus security researcher who wanted to file “cryptocurrency vulnerability” with the help of ChatGPT.  

This is expected, said Garrity. 

“There is an unlimited amount of possibilities which include both good and bad. Much like code can be used for good or bad, so can ChatGPT. Just because a tool is capable of being used for bad doesn’t mean it’s bad itself. It’s the people responsible for using the tool who need to be held accountable to their actions. We should expect ChatGPT to be used for good and bad,” he added. 

And the best feature of ChatGPT? “The ability to reiterate with it to troubleshoot and modify scripts to get to the desired outcome,” said Garrity. 

 

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • More
  • Click to email a link to a friend (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)

Related

Previous Post

The Bug is Fixed: The ‘Achilles’ Heel For MacOS, Patched! 

Next Post

AWS Feature Could Be Weaponized For Exfiltration!

Chandu Gopalakrishnan

Chandu Gopalakrishnan

Executive Editor, The Cyber Express

Related Posts

Westmont Hospitality
Cybersecurity News

ALPHV/BlackCat Ransomware Gang Attacks Westmont Hospitality Group

by Chandu Gopalakrishnan
January 28, 2023
HIVE Ransomware
Cybersecurity News

Hive Ransomware Servers Taken Down in FBI-led Global Law Enforcement Action

by Chandu Gopalakrishnan
January 26, 2023
League of Legends
Cybersecurity News

League of Legends Source Code Up For Sale a Day After $10m Ransom Demand, Riot Games Confirm Leak

by Editorial
January 25, 2023
Australia International Task Force
Cybersecurity News

Australia Launches International Task Force to Counter Ransomware

by Chandu Gopalakrishnan
January 25, 2023
Zoho ManageEngine Vulnerability
Cybersecurity News

CERT-IN Issues Alert on Zoho ManageEngine Vulnerability

by Chandu Gopalakrishnan
January 19, 2023
Next Post
AWS

AWS Feature Could Be Weaponized For Exfiltration!

Latest Issue is Out. Subscribe Now

Cybersecurity Person of The Year 2023
Download Now

Sign Up For Newsletter

Name*

Recommended

US Ransomware

US Traces Record Ransomware Payments, Interpol Report Confirms Trend

November 2, 2022
LockBit 3.0 Claims to Have Stolen Thales’ Data

LockBit Ransomware Gang Claims to Have Stolen Thales’ Data

November 2, 2022

Categories

  • Appointments
  • Budgets
  • Business News
  • Compliance
  • Cyber Essentials
  • Cyber Warfare
  • Cybersecurity News
  • Dark Web News
  • Data Breach News
  • DDoS Attacks
  • Espionage
  • Features
  • Firewall Daily
  • Gitex2022
  • Governance
  • Hacks
  • How to
  • Interviews
  • Learning & Development
  • Main Story
  • Malware News
  • Mergers & Aquisitions
  • Partnerships
  • Podcast
  • Policy Updates
  • Press Release
  • Ransomware
  • Regulations
  • Research
  • Resources
  • Sponsored Content
  • Startups
  • Vulnerabilities
  • Workforce

Don't miss it

Cyber Security for Water Treatment Plants
Sponsored Content

The Threat is Real: Cyber Security for Water Treatment Plants Demands Attention

January 29, 2023
Westmont Hospitality
Cybersecurity News

ALPHV/BlackCat Ransomware Gang Attacks Westmont Hospitality Group

January 28, 2023
SOCs
Features

SOCs to Face Greater Challenges from Cybercriminals Targeting Govt. and Media in 2023

January 28, 2023
cybersecurity
Firewall Daily

‘You are Essentially Funding Cybercriminals When You Pay Ransom’

January 28, 2023
Dr Pepper Russian Branch
Data Breach News

Data Breach at Dr Pepper Russian Branch, Mystery Hacker Steals Confidential Info

January 27, 2023
How to protect and recover your Facebook and Instagram accounts – a complete guide
Resources

How to protect and recover your Facebook and Instagram accounts – a complete guide

January 27, 2023

About

The Cyber Express

Cybersecurity News and Magazine

The Cyber Express is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

Follow The Cyber Express

Contact

For editorial queries: [email protected]

For marketing, PR & media partnerships: [email protected]

For media kit and digitals sales: [email protected]

For Sponsorship/Event Partnership: [email protected]

For Conferences related information: [email protected]

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
555 North Point Center E
Alpharetta, GA 30022, USA.

Tel: (678) 578-8838

Subscribe to Our Feed

RSS Feeds

© 2022 The Cyber Express | By Cyble Inc.

No Result
View All Result
  • Firewall Daily
  • Business News
  • Cyber Essentials
  • Features
  • Cybersecurity Magazine
  • Events
    • World CyberCon Middle East 2023
    • Webinars

© 2022 The Cyber Express | By Cyble Inc.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.