By rashid, 3 March, 2023

The NIST guidelines for password policies are available in NIST Special Publication 800-63B "Digital Identity Guidelines: Authentication and Lifecycle Management". This document is updated regularly as the recommendations evolve.  In the 03-02-2020 update, guidelines for passwords, or memorized secrets, have been greatly simplified and are summarized later in this section. Always refer to the NIST document for the latest information.

NIST guidelines for passwords:

Tags

By rashid, 5 October, 2022

Security concerns must be given greater importance in industrial research.

We don't know the cause of the explosion. And we don't know the source of the espionage, if indeed there was espionage.

But we do know that we are at risk.

Every idea that offers a competitive advantage to Americans is subject to theft.

And that, gentlemen, couId be catastrophic.

The incident in Chicago was tragic, to be sure.

But sometimes that is the price we must pay to ensure our competitive edge in the future.

By rashid, 6 August, 2022

Linux uses logical labels for drives that are then mounted on the filesystem. These logical labels will vary depending on where the drives are mounted, meaning the same hard drive might have different labels at different times, depending on where and when it’s mounted.

When systems have more than one hard drive, Linux simply names them serially by incrementing the last letter in alphabetical order, so the first drive is sda, and the second drive is sdb, the third drive is sdc, and so on.

Tags

By rashid, 6 August, 2022

The dd command makes a bit-by-bit copy of a file, a filesystem, or even an entire hard drive. This means that even deleted files are copied (yes, it’s important to know that your deleted files may be recoverable), making for easy discovery and recovery. Deleted files will not be copied with most logical copying utilities, such as cp.

Tags

By rashid, 27 July, 2022

Imagine the rwx permissions as three ON/OFF switches, so when all permissions are granted, this equates to 111 in binary. Each file or directory has three basic permission types:

Tags

By rashid, 23 July, 2022

To request an IP address from DHCP, simply call the DHCP server with the command dhclient followed by the interface you want the address assigned to. Different Linux distributions use different DHCP clients, but Kali is built on Debian, which uses dhclient. Therefore, you can assign a new address like this:

kali >dhclient eth0

The dhclient command sends a DHCPDISCOVER request from the network interface specified
(here, eth0). It then receives an offer (DHCPOFFER) from the DHCP server and confirms the IP assignment to the DHCP server with a dhcp request.

Tags

By rashid, 23 July, 2022

We can also use ifconfig to change our device MAC address (or HWaddr). The MAC address is globally unique and is often used as a security measure to keep hackers out of networks or to trace them. Changing the MAC address to spoof a different MAC address is almost trivial and neutralises those security measures. Thus, it’s a very useful technique for bypassing network access controls.

By rashid, 21 July, 2022

Cybersecurity 

  • Certificate 1: ISA/IEC 62443 Cybersecurity Fundamentals Specialist
  • Certificate 2: ISA/IEC 62443 Cybersecurity Risk Assessment Specialist
  • Certificate 3: ISA/IEC 62443 Cybersecurity Design Specialist
  • Certificate 4: ISA/IEC 62443 Cybersecurity Maintenance Specialist
  • ISA/IEC 62443 Cybersecurity Expert: Individuals who achieve Certificates 1, 2, 3, and 4 are designated as ISA/IEC 62443 Cybersecurity Experts.

https://www.isa.org/certification/certificate-programs

By rashid, 21 July, 2022

Vulnerability Assessment Tools.

Nmap (“Network Mapper”) is an open source tool for network exploration and security auditing.

nmap — Network exploration tool and security / port scanner

https://nmap.org/book/man.html#man-description

IBM Security Guardium - 

Qualys - qualys.com/free-trial/

Nessus - tenable.com/products/nessus

Nexpose Vulnerability Scanner - https://www.rapid7.com/products/nexpose/

https://phoenixnap.com/blog/vulnerability-assessment-scanning-tools

 

By rashid, 19 July, 2022

A “deep packet inspection” (DPI) system is a device that can decode network traffic and look at the contents or payload of that traffic. Deep packet inspection is typically used by intrusion detection systems (IDS), intrusion prevention systems (IPS), advanced firewalls and many other specialized cyber security products to detect signs of attack.

Intrusion Detection Systems can detect and alert, but do not block or reject bad traffic. Intrusion Prevention Systems can block traffic.

Tags