Category: InfoSec Resources

ICS/SCADA Wireless Attacks

Read the original article: ICS/SCADA Wireless Attacks Introduction Wireless communication has gained attention in the industrial environment. Many organizations have moved from wired networks to wireless in order to provide IT networks with hassle-free… Go on to the site to…

Security controls for ICS/SCADA environments

Read the original article: Security controls for ICS/SCADA environments Introduction  An Industrial Control System (ICS) is any technology used to control and monitor industrial activities. Supervisory control and data acquisition systems (SCADA) are a subset of ICS. … Go on to…

Least Privilege Vulnerabilities Exploitation Case Study

Read the original article: Least Privilege Vulnerabilities Exploitation Case Study Introduction The principle of least privilege is a security concept that limits security exposure in IT environments through balancing security, productivity, privacy and risk. To put it simply,… Go on…

Data execution prevention (DEP) in Windows 10

Read the original article: Data execution prevention (DEP) in Windows 10 Introduction Does this sound familiar? “Sorry, not on the list.” “Oh come on! I was just in there five minutes ago! I just need to go get my coat.”…

What is the NICE Cybersecurity Workforce Framework?

Read the original article: What is the NICE Cybersecurity Workforce Framework? Introduction: All about the NCWF The National Initiative for Cybersecurity Education (NICE), led by the National Institute of Standards and Technology (NIST), is a partnership between government,… Go on…

How to configure password policies in Windows 10

Read the original article: How to configure password policies in Windows 10 Introduction A password is one of the common methods to authenticate user identity. Windows OS comes with various authentication options like PIN, password, fingerprint and token, but the…

Cryptography-based Vulnerabilities in Applications

Read the original article: Cryptography-based Vulnerabilities in Applications Introduction to cryptography Cryptography is designed to help protect the confidentiality, integrity and authenticity of data. By using an encryption algorithm, it is possible to transform data in a… Go on to…

How to use Disk Quotas in Windows 10

Read the original article: How to use Disk Quotas in Windows 10 Introduction Let’s say for a moment that it’s been a big family dinner and you’ve got one massive pie left for dessert. You ask who wants pie, and…

SQL Injection Vulnerabilities

Read the original article: SQL Injection Vulnerabilities Databases and the structured query language A database is designed to store data in an understandable and easily accessible way. Data is organized into tables, rows and columns, making it easy to… Go…

Data Security in Windows 10

Read the original article: Data Security in Windows 10 Introduction By design, Windows 10 is more secure than its predecessors Windows 7 and Windows 8.1. That’s what the people from Microsoft say, anyway. One excellent measuring tool regarding security… Go…

How to use AppLocker in Windows 10

Read the original article: How to use AppLocker in Windows 10 What is AppLocker? AppLocker is an application whitelisting feature which helps an organization to control what apps and files can be run by the user. AppLocker was first introduced…

Format String Vulnerabilities

Read the original article: Format String Vulnerabilities C++ and strings The C++ programming language has a couple of different variable types designed to manage text data. These include C strings, which are defined as arrays of characters, and the C++……

Command Injection Vulnerabilities

Read the original article: Command Injection Vulnerabilities What is a command injection vulnerability? Many applications are not designed to be wholly self-contained. They often access external systems as well, including databases, application programming… Go on to the site to read…

Credential Management Vulnerabilities

Read the original article: Credential Management Vulnerabilities The importance of strong credential management Passwords are the most commonly-used method by which users authenticate to online accounts, computers and other systems. The reason for the massive… Go on to the site…

CMMC relationship (mapping) to other frameworks

Read the original article: CMMC relationship (mapping) to other frameworks Introduction Today, we are continuing our Infosec series on the new U.S. Department of Defense Cybersecurity Maturity Model Certification (CMMC). This article will focus on how the new Defense… Go…

How to configure Windows 10 firewall

Read the original article: How to configure Windows 10 firewall What is a firewall? A firewall is a device which monitors and filters all the incoming and outgoing network traffic and prevents unauthorized access to/within the network. The firewall is…

Windows 10 Security Features

Read the original article: Windows 10 Security Features Introduction Alexander Benoit, senior consultant and head of Competence Center Microsoft, said something during a Microsoft event in Orlando in September 2017: “Because the threat landscape… Go on to the site to…

Key Elements of an Information Security Policy

Read the original article: Key Elements of an Information Security Policy Learn about SCADA security policies Learn the process of developing a SCADA security policy. This skills course covers: ⇒ Developing SCADA security policy ⇒ Security frameworks and strategy ⇒ And… Go…

Understanding the CMMC model

Read the original article: Understanding the CMMC model Introduction The threat of cybercrime has always been a concern for businesses of every size and across all industries, especially with losses linked to cybercrime are expected to exceed $5 trillion… Go…

Me and My Girlfriend 1: CTF walkthrough

Read the original article: Me and My Girlfriend 1: CTF walkthrough In this article, we will solve a Capture the Flag (CTF) challenge which was posted on VulnHub. As you may know from previous articles, VulnHub is a platform which…

Key Elements of an Information Security Policy

Read the original article: Key Elements of an Information Security Policy Learn about SCADA security policies Learn the process of developing a SCADA security policy. This skills course covers: ⇒ Developing SCADA security policy ⇒ Security frameworks and strategy ⇒ And… Go…

SCADA & security of critical infrastructures [updated 2020]

Read the original article: SCADA & security of critical infrastructures [updated 2020] Introduction Current Scenario Industrial control systems (ICS) and Supervisory Control And Data Acquisition (SCADA) systems are critical components for the operation of industrial facilities and… Go on to…

SCADA & Security of Critical Infrastructures [Updated 2020]

Read the original article: SCADA & Security of Critical Infrastructures [Updated 2020] Introduction Current Scenario Industrial control systems (ICS) and Supervisory Control And Data Acquisition (SCADA) systems are critical components for the operation of industrial facilities and… Go on to…

Spamdexing (SEO spam malware)

Read the original article: Spamdexing (SEO spam malware) Introduction: About SEO spam — is my website a target? You’ve spent time and energy in positioning your website high in search engine rankings through good SEO practices. You realize, however, that……

CySA+: Studying for the exam [Updated 2020]

Read the original article: CySA+: Studying for the exam [Updated 2020] Introduction: The merits of being certified as a cybersecurity analyst Many organizations are placing a greater value on hiring employees who have IT security certifications, illustrating the… Go on…

Critical security concerns for the education industry

Read the original article: Critical security concerns for the education industry Balancing cybersecurity & compliance requirements in a resource-limited industry Executive summary The education industry has become a top hacker target: birth certificates, Social Security… Go on to the site…

How to identify and prevent firmware vulnerabilities

Read the original article: How to identify and prevent firmware vulnerabilities Introduction As creators of computer software begin to take security vulnerabilities more seriously, hackers are increasingly targeting the lower ends of the computer stack in hopes of stealing… Go…

DMV 1: VulnHub Capture the Flag (CTF) walkthrough

Read the original article: DMV 1: VulnHub Capture the Flag (CTF) walkthrough In this article, we will find an answer to a Capture the Flag (CTF) challenge published on VulnHub by the author Jonathan. As per the information given by…

How to prevent burnout in a cybersecurity career

Read the original article: How to prevent burnout in a cybersecurity career Introduction: Picture, if you will …  It was just another Wednesday. As usual, Grace Adams had arrived punctually at 8:00, even though she had worked late yet again…

Best Tools to Perform Steganography [Updated 2020]

Read the original article: Best Tools to Perform Steganography [Updated 2020] Learn about Steganography Explore how cryptographic hashing, stenography and other techniques are used to hide data. This skills course covers ⇒ Steganography ⇒ Cryptographic hashes ⇒ And more Start……

Top 9 free security training tools

Read the original article: Top 9 free security training tools Cybersecurity training is one of the best defenses against cyber attacks targeting organizations and individuals alike. Although security training is a tried-and-true defense against cyber attacks… Go on to the…

4 tips for phishing field employees [Updated 2020]

Read the original article: 4 tips for phishing field employees [Updated 2020] Phishing is easy. Let’s just get that out of the way. It’s easy for an attacker, and, if you have the right tools (such as InfoSec Institute’s PhishSim),…

Cybersecurity consultant certifications — Explore your options

Read the original article: Cybersecurity consultant certifications — Explore your options Introduction: IT consultants for cybersecurity matters Cybersecurity consultants are the go-to professionals to devise best ways to protect an organization’s critical assets. Their role entails… Go on to the…

djinn 1: CTF walkthrough, part 1

Read the original article: djinn 1: CTF walkthrough, part 1 Introduction In this article, we will solve a Capture the Flag (CTF) challenge that was posted on the VulnHub website by an author named “0xmzfr.” As per the description given…

How to get promoted in a cybersecurity career

Read the original article: How to get promoted in a cybersecurity career Introduction: What the cybersecurity talent market looks like at the moment Are you considering a career in cybersecurity? If so, this is actually a great time to be…

Active Directory series: Unconstrained delegation

Read the original article: Active Directory series: Unconstrained delegation Introduction In this article series, we will look into the most famous ways that can be used to attack Active Directory and achieve persistence. Note: Attacks discussed in this series have…

Dark web fraud: How-to guides make cybercrime too easy

Read the original article: Dark web fraud: How-to guides make cybercrime too easy Introduction to dark web fraud Dark web fraud constitutes a global information security problem. The widespread availability of how-to guides providing instructions on how to commit such…

Blockchain Security Overview

Read the original article: Blockchain Security Overview Introduction Despite being over a decade old, blockchain has only really taken off within the last few years. During this time, it has moved from a fad to the subject of serious research…

Fundamentals of Blockchain Security

Read the original article: Fundamentals of Blockchain Security Introduction The goal of blockchain is to create a fully decentralized, trustless digital ledger. This is an ambitious goal since most ledger systems in use today, such as those used to track…

Active Directory series: SILVER TICKET

Read the original article: Active Directory series: SILVER TICKET Introduction In this article series, we will look into the most famous ways that can be used to attack Active Directory and achieve persistence. This article will be looking at the…

Aqua 1: VulnHub Capture the Flag (CTF) walkthrough

Read the original article: Aqua 1: VulnHub Capture the Flag (CTF) walkthrough In this article, we will find an answer to a Capture the Flag (CTF) challenge published on VulnHub by the author yunaranyancat. As per the information given by…

Active Directory walkthrough series: GOLDEN TICKET

Read the original article: Active Directory walkthrough series: GOLDEN TICKET Introduction In this article series, we will look at the most famous ways that can be used to attack Active Directory and achieve persistence. This article will focus on Golden…

It’s October 1: VulnHub CTF walkthrough

Read the original article: It’s October 1: VulnHub CTF walkthrough In this article, we will try to solve a Capture the Flag (CTF) challenge that was posted on the VulnHub website by Akanksha Sachin Verma. As per the description given…

DC 8: Capture the Flag (CTF) walkthrough

Read the original article: DC 8: Capture the Flag (CTF) walkthrough In this article, we will solve a Capture the Flag (CTF) challenge that was posted on the VulnHub website by an author named Duca. As per the description given…

Capture the Flag: A walkthrough of EVM: 1

Read the original article: Capture the Flag: A walkthrough of EVM: 1 Introduction Welcome to my write-up for the EVM: 1 machine from VulnHub. This is a beginner-level, intentionally vulnerable virtual machine created for the purposes of testing and strengthening…

Do you need a master’s degree in cybersecurity?

Read the original article: Do you need a master’s degree in cybersecurity? Introduction One of the greatest challenges in landing a job in any field is demonstrating that you possess the knowledge and experience required for the role. This is…

5 takeaways from Bitdefender’s 2019 Hacked Off! report

Read the original article: 5 takeaways from Bitdefender’s 2019 Hacked Off! report Introduction What’s the best way to fend off advanced cyberattacks? What keeps information security professionals awake at night? How do they rate their knowledge of cybersecurity issues? These……

Matrix 3 CTF walkthrough

Read the original article: Matrix 3 CTF walkthrough In this article, we will solve a Capture the Flag (CTF) challenge that was posted on the VulnHub website by Ajay Verma. As per the description given by the author, this is…

CIP

Read the original article: CIP Introduction Common Industrial Protocol (CIP) was created by Open DeviceNet Vendors Association Company (ODVA) specifically for automating industrial processes for sharing the data among various… Go on to the site to read the full article…

Should you phish-test your remote workforce?

Read the original article: Should you phish-test your remote workforce? Introduction: New wave of phishing When the novel coronavirus pandemic began, it caused more than a medical emergency and lockdowns. Like many events before, it also caused an increase in…

CK 00: CTF walkthrough [Part 1]

Read the original article: CK 00: CTF walkthrough [Part 1] In this article, we will solve a Capture the Flag (CTF) challenge that was posted on VulnHub by Vishal Biswas. Per the description given by the author, this is an easy-level…

Open vs Proprietary Protocols

Read the original article: Open vs Proprietary Protocols Introduction To understand ICS/SCADA networks and how various components communicate with each other, we need to understand the underlying protocols that are being used by these systems. “Protocol”… Go on to the…

6 tips for getting a salary increase in cybersecurity

Read the original article: 6 tips for getting a salary increase in cybersecurity Whether you’re saving up for a dream house or simply want some extra spending money on the weekend, getting a salary raise in cybersecurity will certainly help…

Certifications compared: Linux+ vs RHCSA/RHCE

Read the original article: Certifications compared: Linux+ vs RHCSA/RHCE Introduction: Linux talent most sought-after by employers In the past couple of years, there has been a growing demand for open source skills in order to fill shortage gaps. According to…

How much can I make in cybersecurity?

Read the original article: How much can I make in cybersecurity? Introduction: The cybersecurity job market Cybersecurity is a growing field, and with the shortage of specialists expected to grow and the prospect of up to 3.5 million unfilled job…

Critical security concerns for the financial services industry

Read the original article: Critical security concerns for the financial services industry Compliance regulations in the financial services industry  The financial services industry is heavily regulated with compliance requirements focusing on the management of risk and fraud. The sector… Go…

Critical security concerns facing government

Read the original article: Critical security concerns facing government Challenge 1: Staying compliant If the government enforces regulations, then its various departments and functions must also comply with those same regulations. Major data security regulations… Go on to the site…