Cylabs
  • 😊Welcome to CyLabs
  • 101 Series
    • Cyber Security 101
      • Introduction to Cyber Security and core concepts
      • Getting Started into Cyber Security Career
      • Online Cybersecurity Practice Labs to Sharpen Your Skills
      • Cyber Security Interview Q&A
        • Careers in Cybersecurity
      • Stay Tuned : Cyber Resources
        • Blogs for Cyber Security
          • Blogs
            • Penetration Testing Automation
            • Security
              • Metasploit Framework
              • Jenkins Servers: Identifying Vulnerabilities and Exploiting Unauthenticated Access with Groovy Scrip
              • Securing Your Network: Printer Vulnerabilities, LDAP Exploits, and Defense Strategies
              • SSH for Red Teaming and Security Analysis
              • Operating Systems for Penetration Testing: Enhancing Your Cybersecurity Arsenal
              • Hacking Notes
                • Phineas Fisher
        • Cyber News
        • Leading Cybersecurity Companies to follow
        • Cybersecurity Courses and Certifications: Trends in 2024
        • ISACs: Enhancing Cybersecurity through Collaboration and Information Sharing
        • Global and National Cybersecurity Agencies: Guardians of the Digital Realm
        • Cyber Security News Feed Resources
    • Kubernetes 101
    • Web 101
    • Operating Systems
      • Linux 101
        • Linux Kernel
        • Basic Commands and Usage
          • Shell Commands
        • Linux File System
        • apt
        • su and sudo
        • File Search
        • Linux Services
        • Networking
          • Netcat
        • Corn Jobs
        • Shell Scripting
        • Linux OS API's
      • Windows 101
        • Windows system calls
        • Windows Event Logs and IDs
        • Windows UAC
        • Windows Registry
        • Windows Bit Locker
        • Volume Shadow Copy Service
        • Windows OS API's
    • Building the Security Lab
      • Virtualization with Virtual Box
        • Installing and setting Virtual Box
        • Vritual Box Networking
      • Home Lab Setup
        • PF Sense Installation
        • Ubuntu Installation
        • Metasploit Installation
        • Kali Linux Installation
    • Fundamentals of Programming
      • Python 101
      • Powershell 101
      • SQL 101
    • AI/ML and Data Science for Cyber Security and Analytics
    • IT Infrastructure and Hardware
    • Governance, Risk and Compliance
    • Networking 101
      • Network Packets and Frames
      • Network Switches and Routers: The Backbone of Connectivity
      • Network Security Devices and Strategies
      • Network Design and Architecture: A Foundation for Robust Connectivity
      • Specialized Network Equipment and Functions
      • Network Traffic Management and Analysis
      • Advanced Networking Concepts
      • ARP and RARP
      • How DNS, HTTP and HTTPS works
      • Understanding the Basics of Networking
  • Introduction to Cyber Security Operations
    • Security Architecture and Engineering
      • Security Controls
        • Preventive
        • Deterrent
        • Detective
        • Corrective
        • Compensating
        • Directive
    • GRC
      • Information Security and Risk Management
        • Risk Management
        • Supply Chain Risk Management
        • Governance
        • Asset Management
        • Cyber Security Road Map
        • Cyber Security Controls
        • Cyber Security Strategy and Architecture
        • Cyber Security Architecture
        • Risk Assessment and Security Questionnaire
        • Ransomware Prevention
        • Gap Assessment
        • Principle of Least Privilege
      • Governance
      • Asset Security
      • Communication and Network Security
      • Identity and Access Management
      • Security Assessment and Testing
      • Security Operations
      • Software Development Security
      • Security Baselines
      • Security Reporting
      • Data Loss Prevention
      • Zero Trust
      • MFA
      • Compliance
    • Security Policies and Procedures
    • Offensive Security
      • Stages of Penetration Testing
    • Cyber Defense
      • Security Operations Center (SOC)
        • SOC Architecture Development with ELK Stack:
      • Different Classes of Threat Actor
    • Security Principles, Controls and Strategies
      • Defense in Depth
      • Least Privilege
      • Zero Trust
  • Cyber Security Assessment
    • Planning and Scoping
      • Security Engagement
      • Security Assessment Questionaire
      • Who Targeting you
    • Reconnaissance
      • Active Recon
        • Tools
          • NMAP
          • Maascan
          • Recon-NG
          • Maltego
          • Spider Foot
          • Whois
          • TraceRoute
          • Amass
          • The Harvester
          • Nslookup
          • DNS Dumpster
          • BloodHound
          • Relay Attacks
          • Packet Crafting
          • NMAP+Proxychains+TOR
      • Passive Reconnaissance
        • Network Sniffing
          • Wireshark
          • TCPDump
        • Whois (online services)
        • EMail Account Enumeration
          • Hunter.io
        • Search Engine Analysis
          • Google Hacking Database
          • Shodan
          • Censys.io
        • Information Disclousre
        • Banner Grabbing
        • HTML Scrapping
        • Certificate Transparency Logs
        • Open Source Intelligence (OSINT)
          • Ship OSINT
          • Social Media
          • Code Repositories
          • Darkweb Analysis
          • DNS
          • Cached Pages
          • Password Dumps
          • Anonymity
    • Enumeration
      • OS Finger Printing
      • Service Discovery
      • Protocol Enumeration
      • DNS Enumeration
      • FTP Service
      • HTTP/HTTPS
      • WMI
      • DCOM
      • RPC Remote Procedure Call
      • Directory Enumeration
      • Host Discovery
      • Share Enumeration
        • SMB
      • Local User Enumeration
      • Email Account Enumeration
      • SSH Service
      • Wireless Enumeration
        • Wigle.net
        • InSSIDer
        • Aircrack-ng
      • Permission Enumeration
      • Secrets Enumeration
        • Passwords
        • Session Tokens
        • Cloud Access Keys
      • Attack Path Mapping
      • VNC
      • Web Application Firewall
      • Wordpress Scan
      • Remote Desktop Protocol
      • SNMP
      • SMTP
      • Web Crawling
        • Platform Plugins
        • Sitemap
        • Robots.txt
      • Active Directory Enumeration
    • Vulnerability Assessment and Management
      • Terminology
      • Vulnerability Database
      • Vulnerability Scoring
        • CWE
        • CVSS
        • CVE
        • EPSS
      • Vulnerability Scan
        • Authenticated vs Unauthenticated Scans
        • OS Security Assessment
        • Tenable
        • Nikto
        • Open VAS
      • Exploit Databases
      • Tools
        • Tenable.IO
        • Open VAS
    • Exploitation
      • Attack Surface and Target Prioritization
        • High Valued Assets and Identification
        • Vulnerability Metrics
        • End of Life Softwares
        • Default Configuration
        • Running Services
        • Vulnerable Encryption Methods
        • Defensive Capabilities
        • Attack Path
      • Attack Types
        • Network Attacks
          • Virtual LAN Hopping
          • Packet Crafting
            • Attacks Scenario
          • Default Credentials
          • On-Path / Man in the Middle Attacks
          • Certificate Services Attacks
      • Host Based Attacks
        • Privilege Escalation
        • Credential Dumping
        • Shell Escape
        • UAC Bypass
        • Payload Obfuscation
        • Endpoint Security Bypass
        • Process Hallowing
        • Log Tampering
        • DLL Injection
        • Service Path Injection
      • Authentication Attacks
        • LDAP Injection
        • SAML Attacks
        • Open ID Connect Attacks
        • Dictionary Attacks
        • Credential Stuffing
        • MFA Fatigue
        • Pass the Hash attacks
        • Kerberos Attacks
        • Pass the Ticket Attacks
      • Vulnerable Encryption Methods
      • Tools
        • Metsploit
        • Netcat
        • LOLbins
        • Mimikatz
        • Rubeus
        • Certify
        • AD Search
        • Powerview
        • SeaBelt
        • Evil winRM
        • PSEXEC
        • Powersploit
        • Metasploit
        • Impacket
        • Responder
        • CrackMapExec
        • Msfvenom
        • Responder
        • Searhsploit
        • Powersploit
      • Password Attacks
        • Password Cracking
        • Password Spraying
        • Tools
          • Medusa
          • Burpsuite
          • John the Ripper
          • Hydra
          • Hashcat
        • Password Attacks
    • Lateral Movement
      • Relay Creation
      • String Searches
      • Service Discovery
      • Tunneling
        • SSH Tunneling
      • Pivoting
      • Exfiltration
        • DNS
        • HTTPS
        • EMail
        • Cloud Storage
      • Tools
        • sshuttle
        • Page 1
    • Post Exploitation
      • Persistance
        • Scheduled Taks
        • Bind Shell
        • Registry Keys
        • C2 Frameworks
        • Tampering Security Controls
        • Back Door
          • Trojan
          • Root Kit
          • Web Shell
        • Searching Valid Account Credetials
        • New Account Creation
        • Reverse Shell
        • Service Creation
        • Cron Jobs
      • Command and Control
    • Reporting
  • Cybersecurity Frameworks and Standards
    • CREST
    • CIS
    • NIST Publications
      • NIST SP 800-171
      • NIST CSF
      • NIST SP 800-115
    • MITRE
      • MITRE D3FEND
      • MITRE ATT&CK
    • Penetration Testing Execution Standard (PTES)
    • OWASP Top 10
    • Purdue Model
    • Open Source Security Testing Methodology Manual (OSSTMM)
    • Council of Registered Ethical Security Testers (CREST)
    • Zero Trust
    • CMMC
    • Threat Modeling Frameworks
      • STRIDE
      • OCTAVE
      • DREAD
    • Mitigation Strategies
      • Network Segmentaion
      • Access Control
      • Application Control
      • Isolation Techniques
      • Default Password Changes
      • Host based firewall
      • Protocol blocking
      • Port blocking
      • Host based intrusion prevention
      • Endpoint Management
      • Decommissioning
      • Configuration Management
      • Least Privilege
      • Logging
      • Monitoring
      • Encryption
      • Patching
    • Security Governance
      • Data and System: Roles and Responsiblities
      • Security Policies
        • Access Use Policy
      • Security Standards
        • Access Control
        • Encryption
        • Password
      • Security Procedures
        • Change Management
  • Security Domains
    • Security Designing
    • Application Security
      • Cryptographic Attacks
      • Password Attacks
      • Web Application Security
        • Enumeration
          • Cookie and Header Security Review
        • Bruteforce Attack
        • Directory Traversal
        • Insecure Direct Object Reference (IDOR)
        • Session Hijacking
        • File Inclusion Attacks
          • LFI
          • Webshell
          • RFI
        • Server-Side Request Forgery (SSRF)
        • Deserialization Attacks
        • Command Injection
        • Server Side Template Injection
        • Cross Site Scripting (XSS)
        • SQL Injection
          • Union Based SQL Injection
          • Blind SQL Injection
        • Cross-Site Request Forgery (CSRF)
        • XML External Entity (XXE)
        • File Upload Vulnerabilites
        • Remote Code Execution (RCE)
        • Tools
          • Hetty
      • OWASP TOP 10 API
        • API Abuse
        • JWT Token manipulation
        • Graph QL security
        • API security
      • OWASP Top 10 Mobile
      • OWASP Top 10 IOT
      • Web Application Security
        • Getting Started in BugBounty Hutning
        • Subdomain Enumeration
        • Subdomain Takeover: Understanding the Risks and Prevention
        • Tools and Technologies
      • Microservices
      • WPscan
        • Burpsuite
        • Ffuf
        • Gobuster
        • Postman
        • Dirbuster
        • Wfuzz
        • ZAP
      • Tools
        • BurpSuite
        • SQLmap
    • Cloud Security
      • Metadata Service Attacks
      • IAM misconfigurations
      • Tools
        • Pacu
        • Prowler
        • Scoutsuite
        • Docker Bench
      • Container Escape
      • Workload Runtime Attacks
      • Supply Chain Attacks
      • Misconfigurations
        • Network Segmentation
        • Network Controls
        • IAM Credentials
        • Public Access to Services
        • Exposed Storage Buckets
        • Logging Information Exposure
      • Azure Security : Components and Assessment Guide
        • Azure Security Assessment Tools : Installation and usuage
    • Identity and Access Management
    • Cloud Security
      • Cloud Engineering and Architecture concepts
      • Cloud Data Security
      • Cloud Platform and Infrastructure Security
      • Cloud Application Security
      • Cloud Security Operations
      • Cloud Legal, Risk and Compliance
      • Azure Security
      • Azure Pentest
    • DevSecOps
      • Static Application Security Testing (SAST)
        • Code Quality
        • CheckMarx
        • Sonarqube
          • Sonarqube Installation using Helm Chart on AKS
      • Interactive Application Security Testing (IAST)
      • Dynamic Application Security Testing (DAST)
      • SCA
      • Wazuh SIEM and XDR
        • Wazuh on Azure AKS
        • Azure + Argo
      • DevSecOps
    • Social Engineering
      • Vishing
      • Spearphishing
      • Smishing
      • Eavesdropping
      • Impersonation
      • Watering Hole
      • Shoulder Surfing
      • Whaling
      • Phishing
      • Tools
        • GoPhish
        • Beef
        • Evilginx
        • SET social engineering toolkit
    • DevOps
      • Kubernetes
        • Kubernetes Architecture and Components
        • Mastering kubectl: The Command Line Interface for Kubernetes
        • Overview of Kubernetes Tools and Utilities
        • Container vs Pod vs Deployment
        • Kubernetes and Docker Swarm
        • Deploying a Kubernetes Cluster Using Minikube
        • Deploying a Kubernetes Cluster Using Kind
        • Integrating Kubernetes with Azure Key Vault
        • Containers vs Virtual Machines
        • Comprehensive Guide to Kubernetes Security and Analysis Tools
        • Monitoring Kubernetes with Prometheus and Grafana
        • Introduction to Azure Kubernetes Service (AKS) and Deploying Your First Cluster
        • Kubernetes Persistence with Backend Databases
        • Kubernetes StatefulSet vs. Deployment
        • DevSecOps Architecture for Kubernetes
      • Docker
      • Helm
        • Scenario : Configuring Azure Key Vault and Using Secrets in Helm Deployments
      • Git Ops
        • Argo CD
      • Git and Versioning
      • Terraform
      • Virtualization
    • Mobile Security
      • Android Mobile App Security Assessment
      • Suspicious Malware App Analysis
      • Android App Penetration Testing
      • Permission Abuse
      • Jailbreak/Rooting
      • Tools
        • MobSF
        • Drozer
        • Frida
    • IOT/OT/SCADA
      • Power Supply
        • Juice Jacking
      • RFID
      • Bluetooth
        • BlueJacking
        • Bluetooth Spamming
      • Ports and Services
      • Port Mirroring
      • Modbus Attack
      • CAN Bus Attack
      • Replay Attack
      • Memory Registry Attacks
      • Tools
        • BlueCrack
        • Scapy
        • TCP Replay
    • Network Security
      • Network Attacks
        • DNS Attacks
        • DDOS
      • Network Assessment
      • Wireshark
      • Zeek
      • Snort
      • TCPDump
      • Defensive Network
        • Firewalls
        • Intrusion Detection System
    • Wireless Attacks
      • Service Set Identifier (SSID)
      • Wardriving
      • Evil Twin Attack
      • Deauthentication Attacks
      • Signal Jamming
      • Channel Scanning
      • Signal Strength Scanning
      • Tools
        • WiFi Pumpkin
        • AirCrack Ng
        • Kismet
    • Purple Teaming
      • Tools
        • Infection Monkey
        • Atomic RedTeam
        • Caldera
    • Kubernetes Security
      • AKS Security
      • Kube-Hunter
      • KubeEscape
    • Hardware Security
    • Container Security
      • Grype
      • Trivy
      • Clair
    • AI
      • LLM (Large Language Models)
      • Prompt Engineering
      • AI Cyber Security Risk Management
        • AI Policies
      • AI Security
      • AI Attacks
        • Prompt Injection
        • Model Manipulation
      • Security Frameworks
        • MITRE ATLAS
        • OWASP Top 10 LLMs
        • NIST AI Risk Management Framework
    • Reverse Engineering
      • Scenarios
        • Browser Plugin
        • PDF document
        • Word Doc
        • Windows Binary File
        • Mobile App
      • Buffer Overflow
  • Operational Security
    • Identity and Access Management
      • Identity
      • Authentication
      • Accountability
      • Access Management
      • Authorization
      • Access Controls
    • Deception Technology
      • Honeypot
      • Honeynet
      • Honeyfile
      • Honey Token
    • Cryptography
      • Data at Rest
      • Data at Transit
      • Hashing
      • BlockChain
      • Digital Signatures
      • Certificates
      • Encryption
        • Public Key Infrastructure (PKI)
          • Public Key
          • Private Key
        • Tools
      • Certification Preparation
        • Penetration Testing
        • GRC and Audit
    • File Integrity Monitoring
    • Data Security
      • DLP
    • Change Management
      • Impact Analysis
    • Malware Analysis
      • Malware Analysis Tool
      • Malware Analysis Books
      • university courses and resources related to malware analysis
      • Binary Analysis
    • Data Loss Prevention
    • Threat Modeling
      • Attack Surface Management
        • Introduction
      • Threats, Technologies, Procedures
        • Threat Actors
      • Threat Hunting
        • Indicators of Compromise
      • Threat Assessment
        • Threat Modeling
          • OCTAVE
          • DREAD
          • STRIDE
        • Threat Hunting
          • Threat Hunting Blogs
          • Ransomware: An Overview
          • Threat Hunting and Incident Response Q&A
          • Network Traffic Analysis: Wireshark
          • Threat Hunting Questionnaire
          • KQL
          • Email Header Analysis
          • TH
          • Windows Process Exploration
        • Threat Intelligence
          • Threat Intelligence Tools and Techniques
            • Yara
      • Malware Attacks
    • Digital Forensics
      • Network Forensics
      • Forensic Tool Analysis
      • Data Recovery
    • Endpoint Management
    • SOC/SOAR
      • Threat hunting scenarios
      • Log Management
        • AWS VPC flow log analysis
        • Linux Logs
        • Windows Logs
    • Ransomware Prevention
      • APT Groups
    • Security Automation
      • C
      • Powershell
      • Python
      • C++
      • GO
      • Rust
    • Incident Response
      • Scenarios
        • Windows : No Event Logs
      • Tools
        • Chainsaw
    • Defensive Security Controls
    • Physical Security
      • Physical Attacks
        • USB (Universal Serial Bus)
        • Tailgating
        • Lock Picking
        • RFID Cloning
          • Badge Cloning
    • Personal Security
    • Security Awareness and Training
    • Firewall
    • Network Access Control
    • Intrusion Detection System
    • Intrusion Prevention System
    • Operating System Security
    • Secure Protocol Usuage
    • Business Continuity
    • Email Security
    • DNS Filtering
    • user behaviour analytics
    • Host Security
    • Mobile Device Security
    • Change Management
    • Vulnerability Management
      • Vulnerability Assessment
        • Vulnerability Analysis
      • Types of Vulnerabilites
    • Penetration Testing/Red Teaming
    • Disaster Recovery
    • Logging and Monitoring
      • Monitoring
        • Systems
        • Infrastructure
        • Applications
      • Logging
        • Log Data
          • Application Logs
          • Network Logs
          • WAF Logs
          • IDS/IPS logs
          • OS logs
          • Endpoint Logs
          • Firewall Logs
        • Alerting
        • Log Aggregation
      • Tools
    • Endpoint
    • Security Metrics
  • Industry Specific Security:Case Studies
    • Aviation Security
      • The Integral Role of Airports in National Security : Operations Perspective
      • Cyber Attacks on Airports
      • Navigating the Complex Web of Airport Operations: Key Components and Leading Industry Providers
    • Aviation Security
  • Computational Science
    • Quantum Computing
      • Quantum Computing: Unleashing the Power of Qubits
    • Probability
  • Data Engineering
  • AI/ML and Data Science
    • Installation
      • Ollama
    • Machine Learning
    • Large Language Models (LLM)
    • Security Analytics
    • Untitled
      • Roles and Responsibilites
      • Azure AI Services
        • AI Services Security
        • Monitoring Azure AI Services
        • AI services on containers
  • Application Development
    • Django
  • Radom Topics :)
    • CSA WAI
  • CISSP
Powered by GitBook
On this page

Was this helpful?

  1. Introduction to Cyber Security Operations
  2. GRC
  3. Information Security and Risk Management

Risk Management

    • Understanding current organization security environment and posture

    • Understanding critical information security issues faced/facing by organization

    • Initiating cyber security best practices

    • Developing modern Cyber Security program with Defense in Depth and Zero Trust

    • Developing Cyber Security Strategies to mitigate threats

  • Directing/Managing

    • Asset Management

      • High valued assets

      • Critical assets for operations

    • Cyber Physical Security Management

    • Hardware Security Management

    • IOT/OT/SCADA Security Management

    • Cyber Security Operations

      • SIEM

        • Audit log management

      • SOC

        • SOC Playbooks

      • SOAR

      • Incident Response

        • Identifying

        • Containing

        • Eradicating

        • recovering

      • Security breach management

        • Ransomware

        • Data loss

      • Shadow IT

    • Cloud Security Management

      • Cloud Security Architecture

      • Cloud Security tools

        • CASB, CWPP, CSPM

      • Security attacks

      • Cloud security frameworks

        • CSA, cloud adoption frameworks

        • Cloud computing policy

        • Cloud storage policy

      • Zero trust on cloud

    • SecDevOps/DevSecOps/Security Engineering

      • Shift left with security in DevOps Pipeline

      • Security Misconfigurations

      • Security automation

        • Infrastructure as code

      • Data Encryption

        • Symmetric

        • Asymmetric

        • Hashing

        • Encoding

        • Key exchange

        • Certificates

        • Digital signature

      • Data Privacy

    • Application Security

    • Secure Coding and software development

    • Security Awareness

      • Security First

      • Security Situational Awareness

    • Cryptography, Data Security and Protection

    • Vulnerability and Patch Management

      • Build

      • Audit

      • Review

    • Network Security/Perimeter security

      • Layered security controls

      • NGFW, NSM, IDS/IPS, Load Balancers, Proxies,

      • VPN, IPsec

    • Endpoint Security

      • End-user Security

      • EDR, XDR, HIDS,HIPS, EPP, FIM, Sandboxing, whitelist/blocklist

      • Malware defense

    • Cyber Security Governance, Risk, Compliance Management

      • Risk Assessment and Management

      • Information security Management

      • Security policies

        • Business continuity

        • Disaster Recovery

      • Cyber Security Maturity Models

    • Cyber Security Architecture

      • Zero Trust Model

        • Zero trust network access

    • Cyber Security Frameworks and controls

      • NIST cyber security framework

      • CIS critical controls

      • CMMC

      • NIST SP 800-171

      • NIST SP 800-53

    • Cyber Defense architecture and frameworks

      • MITRE ATT&CK

    • Cyber Security Standards

    • Cyber Security Reporting

    • Cyber Gap Analysis

    • Cyber Security Strategic Plan

    • Security workflow and relationships among multiple teams

    • Cyber Security Budget Management

    • Cyber Security Team performance, growth, learning

    • Penetration Testing/Red Team

    • Bring your own device policies

    • Remote work policies

    • Cyber Security product and services SLA's

    • Developing Non-Disclosure Agreements

    • Cyber Threat Landscape

      • Threat actors

      • Nation state attacks

      • TTP's

      • Critical business operations

      • Stakeholders

    • Organization business goals and vision

    • Security metrics

      • Weekly

      • Monthly

      • Quarterly

Architecture

  • Defense in Depth

  • Zero Trust

  • NIST

What you need to understand:

  • TCP/IP

  • OSI Model

    • Layered protocols

    • Layer 2: ARP, VLAN

  • IPv4 Protocol suite

  • IPV6

  • Network protocols and services

  • Nonroutable protocols

News to Follow

Companies to Follow:

Knowledge Base:

  • IETF RFC

  • MITRE Attack framework

  • CVE

  • Exploit DB

Security Assessment Standards:

  • PCI DSS

  • NIST SP 500-83

  • CJIS

Worms and Cyber Attacks for further study

  • Stuxnet

  • Petya

  • Non petya

  • Saudi Aramco cyber attack

  • Sony pictures hack

  • Target Hack

Vulnerabilities further study

  • Heartbleed

  • Shellshock

Assessment logics

Static analysis

Static code analysis

Configuration analysis

Dynamic testing

Network pentesting

Web application testing

Api testing

Cofiguration testing

Social enginering

Recon

Scan

Identify

Investigate

Exploit

Kali linux assuring security by pentesting by tedi heriyanto, lee allen and shakeel ali

Mastering kali linux for advanced penetration testing by rober w.beggs

Nmap

--script dns-srv-enum --script-args dns-srv-enum.domain=ebay.com

Fierce -dns

Threat modeling

Heap management algorithms

Books To Read

  1. Mastering Kali Linux for Advanced Penetration Testing by Robert W Beggs

  2. Kali Linux: Assuring Security by Penetration Testing by Tedi Heriyanto, Lee Allen and Shakeel Ali

Application Security/DevSecOps

Saturday, May 14, 2022

9:43 AM

Vulnerability Scanning

Friday, July 26, 2019

10:23 PM

Nmap

Nessus

Rapid 7 Nexpose

Fingerprinting

Network probing

Nvd.nist.gov

Exploit-db.com

Seclists.org

Hacker one

Securityfocus

Packet strom

Cert vulnerability notes

Scadavulns.com

Immunitysec.com

Coresecurity.com

Metasploit

NIST SP 800-115

Showmount

Dig

Snmpwallk

Define the Security Assessment objective

  • Testing enforced policies

  • Testing coverage of Audit requirements

  • what is the ultimate goal and objective

Build Scope:

  • Design the boundaries which need to be covered

  • Networks, Vlan's, IP Ranges, Applications, assets, People

  • Scan scope

  • How many firewall palced, acl's

  • How DNS resolution works

  • Id DNS data accurate

  • Stages

    • Reconnaissance

      • Identify everything and map the network

      • Which services and ports opened

    • Vulnerability Scan

    • Reviewing the vulnerabilities

    • Possibility of exploitation

Publicly Available Data:

  • Websearch engines

  • Whois

  • Dns servers

  • Email addresses

  • Telephone numbers

  • Usernames

  • Bruteforce grinding

  • Social engineering

  • Publicly exposed databaases

  • Historical usuage of same username and password

  • Subdomains

  • Search engines

    • Google, Bing

  • Netcraft

  • Shodan

  • Censys

  • Domain tools

  • Linked in

  • Whois

  • Bgp.he.net hurricane

  • Ip who is

  • DNS enumeration

  • DNS zone Trasfer

Network Scanning

  • Detecting IP ranges, Vlans, Hostnames, Network devices, Mac Addresses

  • Is ping scan works ?

ICMP type 8 and 13

Nmap -PEPM -sP -vvv -n Iprange

Ping -b broadcast address

Vulnerability Assessment

Saturday, May 14, 2022

10:39 AM

Is any of identified services does have vulenrabilites ?

What is the criticality

Is it impact the business

Is it impact CIA triad

Detecting and Assessing Attack Surface [useful for threat hunting too}

  • Users

    • Social engineering attacks

    • Clickjacking

    • Publicly exposed user creds and databases

  • Client assets

    • Vulnerable applications, browsers

    • Credential dumping

  • Client network

    • HTTPs session hijacking

    • SSH bruteforcing

  • Communication network

  • Communication infrastructure

  • Application Servers

    • Command injection

    • Session management

  • Database Servers

Threat Modeling

need further reading

Vulnerability Exploitation

Saturday, May 14, 2022

10:42 AM

Is there rate limit for sign in acitivity

Running bruteforce

Threat Modeling and Hunting

Saturday, May 14, 2022

11:26 AM

Threat Modeling

Threat Hunting

Def:

proactive and iterative search

validation of all assets connected in organizations network

Hwo to start ?

  • Hypothesis

    • Phishing emails

    • Anomalies behaviors

    • Drive on download

    • Credential hijack

    • Unusual external connections

  • detect anomalies

  • Data collection

    • Endpoint

    • Firewall

    • Application

    • Network

  • Analysis

    • What connections received at time of incident

    • Remote TeamViewer logins

    • SMB 1

  • Hypothesis Validation

    • Conclusion

  • Reporting

Reference :

Pyramid of pain

Detecting and Assessing Attack Surface

  • Users

    • Social engineering attacks

    • Clickjacking

    • Publicly exposed user creds and databases

  • Client assets

    • Vulnerable applications, browsers

    • Credential dumping

  • Client network

    • HTTPs session hijacking

    • SSH bruteforcing

  • Communication network

  • Communication infrastructure

  • Application Servers

    • Command injection

    • Session management

  • Database Servers

Know you network diagram ?

Know your assets ?

How many departments ?

How many servers in DMZ ?

Which firewall we have ? How many ?

Which router we have ?

Which switch we have ?

Which WAF we using ?

Desktops

Windows

Linux

Test network

Servers

Windows

Linux

Vm environment

Printers

IOT/SCADA

(get IP ranges all we have)

Which security controls we have

Which preventive controls we have

Which detective controls we have

What do we need? Centralized log collection

What is logging?

Syslog port numbers

  • Regex for threat hunting on raw logs

Log sources

  • Firewall logs

  • IDS/IPS

  • VPN

  • Proxies

  • Endpoint/edr

  • MFA failure attempts/2Factor

  • Authentication logs

  • Autherizaiton logs

What do we do? Understand known good patterns, detect the signatures to identify indicators of compromise

What is IOC’s and IOA’s

  • Indicator of compromise

  • Indicator of Attack

What is a threat Intelligence?

We can’t completely relies on threat intelligence

Because IP’s, DNS, File signatures changes

Focus on behavioural threat intelligence

  • Github used as c2c, how to detect that

  • Cloud servuces and CDN’s are often abused

What are host intrusion detection system?

What are network intrusion detection systems?

suricata

Oranization to maintain security posture

  • Run periodic audit and internal pentest

Vulnerability Management

What is the scope ?

Which audit cortrols we need to follow ?

Who is doing the patches ?

Who responsible for patching ?

Research:

  1. Is logging disabled on any device or asset

  2. Is antivirus disabled on any device

  3. Malware persistence mechanisms

  4. Tools

    • Empire

    • Dnscat2

What we are doing reactive, we need proactive

  • Managing SOC alerts

  • Check logs for suspect activity

  • Check dashboards for unusual activity

  • Monitor and respond to EDR alerts

  • These are all reactive activities

  • Threat hunting is a proactive process

How to perform asset integrity

Network threat hunting

  • C2 communication/threat hunting

    • Outbound connections

    • Dns over http

      • TXT records

    • Using zeek

    • Connection persistence, happening more often

    • Longest network connections

    • Total time the pair has in contact

    • Data exfiltration data size

    • Expected dns traffic

    • Dns traffic and certificate match

    • Moving data to random ip

    • Unique client signature

    • Self signed cerificates

    • Abnormal protocol usauage

    • External IP reputation check

    • Failed sign in, connectins, protocol communications

  • Beacons activity with respect to time

    • Repetitive connections ip’s and FQDN

    • Connections to cdn

      • Which threat actors use which cdn

      • Beacon detection using kmeans clustering

Types of threat hunting

  • Active

    • Asset isolation

    • Memory forensics

  • Passive

    • Review packets

    • Review siem logs

Threat Hunting using Firewall

What is network jitter

Detection of cobaltstirke c2 communication

Detect heartbeat

Session size

Connection to TeamViewer

To avoid false positives

  • Check connection persistence

  • What is valid use case

  • Legit need

    • NTP

    • Windows notification services

    • Checking for patches

  • Outbound protocols

    • 5222 chrome remote desktop

    • 5800 and 590x vnc

    • 502 modbus

  • C2 tunnelling

  • Standard ports for unexpected apps

  • Applications using not standard ports

Counter cyber terroirism

Check for common web vulnerability strings and useragents

  • /etc/passwd

Review LolBins

  • Windows

  • Linux

  • MacOS

Further research Questions

Saturday, May 14, 2022

12:53 PM

Ransomware groups which generate both keys on victim machine

Which programs/processes doesn't follow DEP and ASLR

How threat actors bypass ASLR or memory restrictions

Code ideas and questions

Saturday, May 14, 2022

1:18 PM

Information gathering scripts

Subdomain enumeration methodologies

ASN Lookup

Search engine search for sensitive files download

File header sensitive data

Pdf/doc/text/ sensitive keywords search

Comments grabber

Github/gitlabsearch

Network Security Assessment

Friday, February 18, 2022

11:32 AM

Google Project Zero

Exploitation software defect

Defense and depth

MITRE Framework

CVE database

NIST Framework

NIST Vulnerability Database

NIST 800-115

NIST 53

NIST vulnerability database

Exploit database

CERT security notes

NSA DevSecOps

NSA IAM

DISA

CSEG CHECK

- CHECK Fundamental Principles

PCI DSS

HITRUST

HIPPA

ISO 27001

PTES

  • PreEngagement

  • Intelligence Gathering

    • Reconnaissance

      • DNS

      • Subdomains

      • ASN

      • Webservers

      • Mail servers

      • VPN

      • User names/emails

    • Port scans

      • TCP, UDP, 65536

    • Identifying networks and hosts

  • Threat Modeling

  • Vulnerability Analysis

    • Nmap, Tenable

    • Service fingerprinting

    • Network probing

  • Exploitation

  • Post-Exploitation

  • Reporting

System administration

  • Windows

    • Netbios

    • SMB

    • RPC Services

    • Users

    • Groups

    • Shares

    • Domains

    • Password Policies

  • Linux

    • RPC services

    • NFS services

    • R services (rsh, rexec, rlogin)

  • Best practices

  • OS internals

Computer networking

  • OSI layers

  • TCP/IP

  • Network protocols

    • FTP, SMTP, HTTP

  • X86 processor registers

  • Fundamentals of Cryptographic

  • OWASP Top 10

Network Security Assessment

  • Cyber Risk Management

  • Information Assurance process

  • Security assessment workflows and tactics

  • DDOS attacks

  • Man-in-the-middle Attacks

What is client business ?

What is the criticality in business?

Critical Assets ?

Cyber Gap Analysis

Asset classification

Who are our adversaries

  • State sponsored

  • Criminals

What is our attack surface ?

Which are exposed

  • External network and infrastructure

  • Users

  • Web application

Network Exploitation strategies

Network defense strategies

  • Network segmentation

  • Zerotrust policies

  • Defendable networks

Vulnerability Assessment

  • Vulnerability Classes

  • Adversary types

Network Discovery

  • External Network Mapping

    • Ports and Services

  • Local Network Discovery

    • Asset Discovery

    • Network Sniffing

  • IP Network Scanning

    • Scan Types

    • IDS evasion

    • Low-level packet analysis

  • Common Network protocols and services analysis

    • SSH

    • FTP

    • Kerberos

    • SNMP

    • VNC

    • Common ports

  • Microsoft Services

    • Netbios

    • SMB version

    • RPC

    • RDP

  • Mail Services

    • O365

    • SSO

    • MFA

    • SMTP

    • POP3

    • IMAP

    • Transport Rules

    • Information Leak

    • BruteForce attacks

  • VPN Services

    • Ipsec

  • TLS/SSL services

    • Data security on transit

  • Web Application Architecture

    • OWASP Top 10

      • XXE

      • API abuse

      • Privilege escalation

    • Vulnerable frameworks

    • Serialization Bugs

      • Python pickel

      • Yaml

      • Java

    • Business Logic

      • Compression techniques

      • Encoding techniques

      • Parsing mechanism

      • Rendering

      • Shell shock

    • Security Assessment

      • Source code

      • Configurations

        • Server

        • Infrastructure

        • Architecture

    • Dynamic Testing

      • Network infrastructure

      • Web services (API mobile applications)

        • REST API

          • Fuzzing

        • SOAP API

  • Data Storage

    • Storage protocols

  • Assessment Process

    • DNS Information retrieval

    • Network mapping

    • Network Probing

      • ICMP, TCP,UDP

    • TCP Service banner grabbing

    • SNMP enumeration

      • MIB

    • Router and Switches enumeration

      • Telnet, TFTP

    • User enumeration

      • Compromised user accounts

  • OT

    • SCADA

    • IOT

PreviousInformation Security and Risk ManagementNextSupply Chain Risk Management

Last updated 1 year ago

Was this helpful?

http://bit.ly/2bfCqgR
https://nvd.nist.gov/vuln/search
https://csrc.nist.gov/publications/detail/sp/800-115/final
https://www.ncsc.gov.uk/collection/cloud-security?curPage=/collection/cloud-security/implementing-the-cloud-security-principles