san
•
24 November 2024
•
7 mins
Satark 2.5 was an introductory session on cybersecurity best practices. if you want to think of a domain where cybersecurity isn’t involved, well you can’t as cybersecurity is used in every aspect for protecting data, processes or connections. cybersecurity is crucial for any domain of computer science.
in his book published in 1997, Gene Spafford mentioned the famous quote: “The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards - and even then I have my doubts.” try guessing the vulnerability here. yep, it’s the armed guards. people are the biggest vulnerability in any system.
to protect your-self from various cyber threats there are a huge number of cybersecurity companies which provide protection and scanning features. popular companies are symantec, kaspersky, cisco, juniper networks, etc…
the following are percentage of organizations using each solution according to 2019 survey: ![[/assets/images/cyberStatsan.png]]
nmap
is used to map a network.
to check your local IP address, you can use the command ip a
.
to install nmap
, you can use
brew install nmap
if you are using homebrew as your package manager or
sudo apt install nmap
if you want to useapt
.
running ip a
will give you a result similar to the following:
![[/assets/images/ipaSan.png]]
and running nmap
let’s say on your college website will give you a result like:
![[/assets/images/nmapCollegeSitesan.png]]
you can see that you don’t need to specify a IP always, the domain name of a website will help the system fetch it for you.
you can see which of the ports are open. if the IP is public you can try and ssh
into the system.
if you see any error saying that the ports are blocked, you can try using flags in your prompts.
-Pn
: scans all ports
there is also the prompt -sP
which detects for vulnerable ports
-sP
: detects vulnerable ports
burp suite is web security testing app. this allows you to test websites in a inbuilt browser, for example: web application penetration testing. it also allows you to manipulate the request going from your end or while receiving from your end. for example: if you open a temporary project –> proxy –> open browser –> “intercept on” and open google you will get something like this- ![[/assets/images/burpsuitDemosan.png]] if you click on the forward button, the requests will get cleared. google has a lot of forward requests as the there are a lot of trackers. you can also see that that it is calling play.google.com which is not required but this is also google we are talking about. this will also help you find out is a website is talking to a third party or not.
hydra is popular password cracking tool which uses brute force method to crack passwords.
there are frameworks/VM which have built-in vulnerabilities for one to explore. check out metasploit and metasploitable3.
hashcat is a password recovery tool. or is it? :)
tcp trace route shows the route of package taken to reach the server. one use case if that if one of the route is found to be unrelated for a package you can suspect that something is up.
ip sweeper tells you how many machines are connected to the same sub-net as you.
exploiting vulnerabilities requires you to know different programming languages because you know what the software you are “testing for” is written in, so having a brief understanding of different programming languages is a must for cybersecurity experts.
Raspberry Pi Pico is a tiny microcontroller. this tiny tool as be exploited by writing a malicious code and connecting it to a victims computer. one way is to make it look like a keyboard that is, when the victims computer connects to it, it will treat it as a keyboard and opens a browser and types a malicious link or runs a harmful script. for more about R-Pi Pico, check out Mukti’s R-Pi Pico session documentation.
wifi-direct technology allows you to create your own wifi-network for for sharing files, printing, sync etc… this technology is usually used in printers, fridges, etc. which can easily exploited and used for DDoS attacks or monitoring which is much more harmful moreover it uses WPA2 technology which is now replaced with WPA3.
hostapd allows you to act like network access point and monitor traffic. for example, you setup a wifi network called “free-wifi” from you computer which provides internet to those who connect to it while monitoring all of their internet traffic.
a honeypot is purposeful vulnerability/ties which is has been setup to bait hackers. a popular way is to make a global website using ngrok/zrok which will host your local machine application and provide you with a public IP address for it, and add vulnerabilities to your website and a honeypot.
for any doubts, bugs or errors, contact Mukti Core from our telegram group or drop a text on the Tech-help section on our telegram group.