Post

IBMSec course 1 Introduction to Cybersecurity Tools & Cyber Attacks

Introduction to Cybersecurity Tools & Cyber Attacks

[toc]


Week 1


Security Threats

Screen Shot 2020-09-17 at 12.17.44

Vulnerability Assessments

Screen Shot 2020-09-17 at 12.23.10

Roles in Security

Screen Shot 2020-09-17 at 12.24.37

Cybersecurity Introduction

Screen Shot 2020-09-17 at 16.19.05

Screen Shot 2020-09-17 at 16.19.37

Screen Shot 2020-09-17 at 16.20.44

!!

Screen Shot 2020-09-17 at 16.25.23

Screen Shot 2020-09-17 at 16.29.17

Screen Shot 2020-09-17 at 16.34.21

Screen Shot 2020-09-17 at 16.36.02

Screen Shot 2020-09-17 at 16.38.15

Beyond Technology: Critical Thinking in Cybersecurity

Screen Shot 2020-09-17 at 16.43.15

Screen Shot 2020-09-17 at 16.44.55

Screen Shot 2020-09-17 at 16.45.44

Screen Shot 2020-09-17 at 16.46.12

Screen Shot 2020-09-17 at 16.49.10

Screen Shot 2020-09-17 at 16.49.56

Screen Shot 2020-09-17 at 16.50.56

Screen Shot 2020-09-17 at 17.33.14

Screen Shot 2020-09-17 at 17.34.09

Screen Shot 2020-09-17 at 17.35.52

Screen Shot 2020-09-17 at 17.40.49

Screen Shot 2020-09-17 at 17.42.11

Screen Shot 2020-09-17 at 17.43.09


week 2 Security Attacks, Actors and their Motive

type of attack

Screen Shot 2020-09-17 at 19.47.02

Screen Shot 2020-09-17 at 19.49.10

Screen Shot 2020-09-17 at 19.53.42

Screen Shot 2020-09-17 at 19.55.19

Screen Shot 2020-09-17 at 19.58.43

Syrian Electronic Army

  • Website defacement and electronic surveillance against Syrian rebels and other opposition
  • Defacement attacks against Western websites that it contends spread news hostile to the Syrian government
  • Spamming popular Facebook pages with pro-regime comments:[19] The Facebook pages of President Barack Obama and former French President Nicolas Sarkozy have been targeted by such spam campaigns.
attackresult
2011 
Gucciferexposed the existence of Hillary Clinton’s private email server,
Sony attackThe Lutz group on 2011 goes to Sony and hack their PlayStation network system and they leak a lot of information regarding credit cards, regarding accounts on their PlayStation network.
Singapore attackslot of hackers that send attacks into websites, not just government websites, but also banks and companies on Singapore to protest for some policies, some laws that the Singapore government are passing.
2014 
LinkedIn attackleak was something pretty important.
2015 
TargetAt least 100 million of credit cards was leaked.
2016US election attack, CNN attack
Dyn attackusing something called Mirai attack. First attack using IoC to perform a DDoS attack in 2016 service, DNS servers.
2017, 2018Shadow Brokers, EternalBlue, WannaCry, Emotet, we have NSA leaks.
ASUS attacksupply chain attacks. Somebody or a group of hackers or somebody hack into ASUS. And on their supply chain for their computers, especially for the operating systems and software on their computers install a malware.

Screen Shot 2020-09-17 at 20.27.43 tools | note —|— CyberBears for the US election hacks | used two tools called SeaDaddy and SeaDuke. Those tools were used to generate backdoors into the committee of the party BlackEnergy Russian hackers | exploit vulnerabilities on SCADA or PLCs or ICS systems that those systems are normally used on power plants, on nuclear plants, on water plants, things like that. And Ukraine was part of that Shamoon Duqu Flame DarkSeoul WannaCry | for criminals and sponsor hackers from governments to exploit, not just infrastructure, but also data and other information from businesses, personal information and Internet and all.

Security Attack Definition

Screen Shot 2020-09-17 at 20.34.12

Screen Shot 2020-09-17 at 20.34.29

Security services

Screen Shot 2020-09-17 at 20.37.19

Screen Shot 2020-09-17 at 20.38.15

Screen Shot 2020-09-17 at 20.45.25

Screen Shot 2020-09-17 at 20.48.06

Security Mechanisms

Screen Shot 2020-09-17 at 20.53.12

Screen Shot 2020-09-17 at 20.54.20

Screen Shot 2020-09-17 at 20.56.48

Network Security Model

Screen Shot 2020-09-17 at 20.57.50

Screen Shot 2020-09-17 at 20.59.26

Screen Shot 2020-09-17 at 21.01.09

Screen Shot 2020-09-17 at 21.02.44

Organizational Threats

Screen Shot 2020-09-17 at 21.04.06

Screen Shot 2020-09-17 at 21.06.39

Attacks

Screen Shot 2020-09-17 at 22.43.51

Screen Shot 2020-09-17 at 22.44.42

Screen Shot 2020-09-17 at 22.45.20

Screen Shot 2020-09-17 at 22.47.04

Security Architecture Attacks

Screen Shot 2020-09-17 at 22.48.31

Screen Shot 2020-09-17 at 22.49.30

Malware and Ransomware

Screen Shot 2020-09-17 at 22.54.53

Screen Shot 2020-09-17 at 22.56.31

  1. virus: a piece of malicious code that spreads from one computer to another by attaching itself to other files using self replication. Note that they’d require human interaction to self replicate. Do to its self replicating nature, they are quite difficult to remove from a system. They also use tactics to hide on the system, like polymorphic code which encrypts and duplicates itself which makes it a little bit harder for the antivirus to find. This is known as a polymorphic virus. Other category of a Malware virus which threatens to shield itself by obscuring the true location in the system. And its code make it harder to reverse engineer to create signatures for it.
  2. Worms: self-replicating Malware that does not require human interaction. main goal is spread and cripple resources or turn computers into zombies.
  3. Trojans: hidden Malware that causes damage to a system or gives an attack access to the host. They are usually introduced into the environment to a computer by posing as a vending package, such as a game, wallpaper, or any kind of download.
  4. Spyware, the main goal of spyware is to track and report the usage of the host or to collect data that the attacker desires to obtain. It can include web browsing history, personal information, marketing information, any kind of files the attacker wants to chase.
  5. Adware, code that automatically displays or downloads unsolicited advertisements, usually seen on a browser pop up.
  6. RATs remote access tool/trojans. allow the attacker to gain unauthorized access and control the computer.
  7. rootkit: piece of software that is intended to take full or partial control of a system at the lowest level. Now we have Ransomeware.

Screen Shot 2020-09-17 at 22.59.19

Screen Shot 2020-09-17 at 23.00.57

Screen Shot 2020-09-17 at 23.01.32

Screen Shot 2020-09-17 at 23.03.36

Internet Security Threats - Mapping

Screen Shot 2020-09-17 at 23.06.52

Screen Shot 2020-09-17 at 23.07.31

Internet Security Threats - Packet Sniffing

Screen Shot 2020-09-17 at 23.08.26

Security Threat - IP Spoofing

Screen Shot 2020-09-17 at 23.09.56

Screen Shot 2020-09-17 at 23.52.57

Security Threats - Denial of service

Screen Shot 2020-09-17 at 23.11.28

Screen Shot 2020-09-17 at 23.11.53

Screen Shot 2020-09-17 at 23.50.41

Security Attacks - Host insertions

Screen Shot 2020-09-17 at 23.12.38

Screen Shot 2020-09-17 at 23.12.55

Screen Shot 2020-09-17 at 23.13.54

Screen Shot 2020-09-17 at 23.16.50

Social Engineering - Phishing and Vishing

Cyberwar


week 3

Screen Shot 2020-09-25 at 17.12.26

Screen Shot 2020-09-25 at 17.12.43

Screen Shot 2020-09-25 at 17.13.24

Screen Shot 2020-09-25 at 17.14.24

Screen Shot 2020-09-25 at 17.16.48

Screen Shot 2020-09-25 at 17.18.12

Screen Shot 2020-09-25 at 17.18.53

Incident Response Process

Screen Shot 2020-09-25 at 17.33.24

Screen Shot 2020-09-25 at 17.33.56

Screen Shot 2020-09-25 at 17.34.36

Screen Shot 2020-09-25 at 17.38.51

Screen Shot 2020-09-25 at 17.41.04

Screen Shot 2020-09-25 at 17.42.08

Screen Shot 2020-09-25 at 17.46.07

Screen Shot 2020-09-25 at 17.47.01

Screen Shot 2020-09-25 at 17.48.14

Screen Shot 2020-09-25 at 17.50.36

Screen Shot 2020-09-25 at 17.51.33

Screen Shot 2020-09-25 at 17.54.26

week 4 security Tools

Screen Shot 2020-09-25 at 17.58.29

Screen Shot 2020-09-25 at 20.03.01

Screen Shot 2020-09-25 at 20.04.03

Screen Shot 2020-09-25 at 20.05.12

application gateway

application gateway : app = 1:1

Screen Shot 2020-09-25 at 20.06.26

XML gateway

Screen Shot 2020-09-25 at 20.10.18

Screen Shot 2020-09-25 at 20.13.08

firewalls

stateless:

  • faster
  • less secure, packet from different source ip

Screen Shot 2020-09-25 at 20.13.39

Screen Shot 2020-09-25 at 20.16.35

Screen Shot 2020-09-25 at 20.17.17

Screen Shot 2020-09-25 at 20.18.20

Screen Shot 2020-09-25 at 20.19.24

Screen Shot 2020-09-25 at 20.20.29

Screen Shot 2020-09-25 at 20.22.18

Screen Shot 2020-09-25 at 20.22.51

Screen Shot 2020-09-25 at 20.23.34

Screen Shot 2020-09-25 at 20.24.29

Screen Shot 2020-09-25 at 20.26.24

Screen Shot 2020-09-25 at 20.27.26

Screen Shot 2020-09-25 at 20.29.03

Screen Shot 2020-09-25 at 20.30.55

Screen Shot 2020-09-25 at 20.32.52

Screen Shot 2020-09-25 at 20.35.28

Screen Shot 2020-09-25 at 20.37.06

Screen Shot 2020-09-25 at 20.37.59

Screen Shot 2020-09-25 at 20.40.00

Screen Shot 2020-09-25 at 20.40.45

Screen Shot 2020-09-25 at 20.41.49

Screen Shot 2020-09-25 at 20.45.10

PTES techinical Guidelines

Screen Shot 2020-09-25 at 20.52.06

Screen Shot 2020-09-25 at 20.53.44

Screen Shot 2020-09-25 at 21.01.17

Screen Shot 2020-09-25 at 21.02.25


.

This post is licensed under CC BY 4.0 by the author.

Comments powered by Disqus.