By rashid, 6 August, 2022

The dd command makes a bit-by-bit copy of a file, a filesystem, or even an entire hard drive. This means that even deleted files are copied (yes, it’s important to know that your deleted files may be recoverable), making for easy discovery and recovery. Deleted files will not be copied with most logical copying utilities, such as cp.

Tags

By rashid, 27 July, 2022

Imagine the rwx permissions as three ON/OFF switches, so when all permissions are granted, this equates to 111 in binary. Each file or directory has three basic permission types:

Tags

By rashid, 23 July, 2022

To request an IP address from DHCP, simply call the DHCP server with the command dhclient followed by the interface you want the address assigned to. Different Linux distributions use different DHCP clients, but Kali is built on Debian, which uses dhclient. Therefore, you can assign a new address like this:

kali >dhclient eth0

The dhclient command sends a DHCPDISCOVER request from the network interface specified
(here, eth0). It then receives an offer (DHCPOFFER) from the DHCP server and confirms the IP assignment to the DHCP server with a dhcp request.

Tags

By rashid, 23 July, 2022

We can also use ifconfig to change our device MAC address (or HWaddr). The MAC address is globally unique and is often used as a security measure to keep hackers out of networks or to trace them. Changing the MAC address to spoof a different MAC address is almost trivial and neutralises those security measures. Thus, it’s a very useful technique for bypassing network access controls.

By rashid, 21 July, 2022

Cybersecurity 

  • Certificate 1: ISA/IEC 62443 Cybersecurity Fundamentals Specialist
  • Certificate 2: ISA/IEC 62443 Cybersecurity Risk Assessment Specialist
  • Certificate 3: ISA/IEC 62443 Cybersecurity Design Specialist
  • Certificate 4: ISA/IEC 62443 Cybersecurity Maintenance Specialist
  • ISA/IEC 62443 Cybersecurity Expert: Individuals who achieve Certificates 1, 2, 3, and 4 are designated as ISA/IEC 62443 Cybersecurity Experts.

https://www.isa.org/certification/certificate-programs

By rashid, 21 July, 2022

Vulnerability Assessment Tools.

Nmap (“Network Mapper”) is an open source tool for network exploration and security auditing.

nmap — Network exploration tool and security / port scanner

https://nmap.org/book/man.html#man-description

IBM Security Guardium - 

Qualys - qualys.com/free-trial/

Nessus - tenable.com/products/nessus

Nexpose Vulnerability Scanner - https://www.rapid7.com/products/nexpose/

https://phoenixnap.com/blog/vulnerability-assessment-scanning-tools

 

By rashid, 19 July, 2022

A “deep packet inspection” (DPI) system is a device that can decode network traffic and look at the contents or payload of that traffic. Deep packet inspection is typically used by intrusion detection systems (IDS), intrusion prevention systems (IPS), advanced firewalls and many other specialized cyber security products to detect signs of attack.

Intrusion Detection Systems can detect and alert, but do not block or reject bad traffic. Intrusion Prevention Systems can block traffic.

Tags

By rashid, 16 July, 2022

A Smart Grid, a petroleum refinery, and a city skyscraper may all utilize ICS, yet each represents unique variations in terms of size, complexity, and risk. All are built using the same technologies and principles making the cyber security concerns of each similar and the fundamentals of industrial cyber security equally applicable.

By rashid, 16 July, 2022

VLANs are susceptible to a variety of Layer 2 attacks. This includes flood attacks, which are designed to cripple Ethernet switches by filling up their MAC address table, Spanning Tree attacks, ARP Poisoning, and many more.Â