Security Class

comptia website

Search for: comptia website

Here is the homepage

Top 100 security tools nessus

Search for: Top 100 security tools nessus

Here is one of the links to that content

Use this for class:\\172.16.101.20

compTIA practice tests

Search for: compTIA practice tests

compTIA certification exam details

Search for: compTIA certification exam details

What is VCM? for taking tests

Search for: What is VCM? for taking tests

How do you prevent google drive from syncing data to a particular device?

Search for: How do you prevent google drive from syncing data to a particular device?

how to prevent syncing google drive on certain computers

Search for: how to prevent syncing google drive on certain computers

How can i copy a file or folder to google drive without syncing?

Search for: How can i copy a file or folder to google drive without syncing?

accessing drive.google.com from a public computer

Search for: accessing drive.google.com from a public computer

Show images for: CIA Triad

Steganography

Search for: Steganography


Hashing
Signatures
Certs

encryption
access controls
steganography

redundancy
fault tolerance
patching

Non repudiation

Search for: Non repudiation

Here is an article from Gary Kessler on Steganography


you are (finger print, retinal)
you have (key or id card)
you know (password)

whats up with kerberos

Search for: whats up with kerberos

State and applicability of kerberos

Search for: State and applicability of kerberos


MAC - Mandatory access control
DAC - Discretionary
RBAC - Rolebased

clearance has to dominate your classification

military

through security labels

non discretionary

What is MAC: mandatory access control

Search for: What is MAC: mandatory access control

Discretionary access control: DAC

Search for: Discretionary access control: DAC

giving users a certain access by the owner directly with out the idea of roles or a mandatory

Giving access to based on roles and not directly to users.

Rule based security

Search for: Rule based security

deny first and then give access if needed.

Principal of None to least privilege

Time of day controls


id cards
fobs
number generators

retina (best)
fingerprint
voice recog
facial recog

Mutual Authentication

Search for: Mutual Authentication

Professor Messer YouTube videos on security

Search for: Professor Messer YouTube videos on security

Various types of ciphers

Search for: Various types of ciphers


Stream cipher - fast on the fly, light weight
Block cipher - at leisure and stronger

Convert it to binary first

Use the last bit in every pixels 8 bits

The resulting image is a bit different but not much

that is how

You can do this for digital water marks

Keep in mind hashes are oneway!

If someone gets hashes, they do a dictionary search and generate hashes for each.

It is worthwhile to put special characters because of this

rainbow table

Search for: rainbow table

A rainbow table is a precomputed table for reversing cryptographic hash functions, usually for cracking password hashes. Tables are usually used in recovering a plaintext password up to a certain length consisting of a limited set of characters.

salted hashes on servers

Search for: salted hashes on servers


MD5 ? 128-bit, too many collisions
SHA1 ? 160-bit, SHA-256, SHA-384, SHA-512
NTLM versions 1 and 2 ? used by Microsoft  since Windows NT
RIPEMD ? 128, 160, 256, 320 bit strengths, 256 and 320 few collisions 
HMAC ? integrity + authenticity by combining hash with a secret key

fast
shared keys
Need to protect keys

DES ? 64-bit block, 56-bit key
3DES ? encrypts each block 3x, triples performance impact
AES ? 128-bit block, 128, 192, or 256-bit key
Blowfish ? 64-bit block, variable key length
Twofish ? 128-bit block, 128, 192, or 256-bit key
RC4, 5, 6 ? RC4 is stream cipher, 5 & 6 are block

guess a key and see if it can be translated.

fast
secure

RSA? - variable key length and block size
DH ? provides secure key exchange
ECC ? shorter keys than RSA with same security, used in wireless
DHE ? variant of DH ephemeral keys
ECDHE ? variant of DH using ECC and ephemeral keys

DH - Diffey Helman to use Asymmetric keys to exchange symmetric keys


quick

Elliptic curve cryptography

Search for: Elliptic curve cryptography

Two parties can communicate securely if they hold each others public keys


Integrity
Non-repudiation
Not for confidentiality

A signature is a hash encrypted with private keys


Key exchange
Bulk encryption
Message authentication code
Pseudorandom function

symmetric key is also called a session key

A certificate is a public key


Key stretching makes it harder to crack passwords and passphrases.
Original key is enhanced by running it through a key-stretching algorithm
Keys are usually larger than 128 bits 
   PBKDF2
   Bcrypt

Use pass phrases instead of dictionary words


Exchange public certs
Talk to the authority and verify public certs
Share session specific symmetric keys
communicate

Summary of Active Directory

Search for: Summary of Active Directory

If you trust the website through other physical means it is ok to accept self signed certs


Spoofing
Impersonation
Hoax
Phishing
Vishing
Spear Phishing **
Whaling
URL hijacking/typo squatting
Spam and spim
Shoulder surfing
Dumpster diving
Tailgating

A virus is transmitted explicitly by users

A worm spreads itself

-- they may be one and the same and virus may be both now

What is a rootkit?

Search for: What is a rootkit?

A rootkit is a stealthy type of software, typically malicious, designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to a computer

some virus that goes off based on some kind of logic

Online certification testing: Pearson Vue

Search for: Online certification testing: Pearson Vue

homepage for pearson vue

Name of the test: CompTIA security plus

There is a file called SAM in windows that keeps user hashes


Cain & Abel ? (demo)
Ophcrack ? (demo)
L0phCrack
John the Ripper

Guessing
Stealing
Dictionary attack
Brute force attack
Rainbow tables
Hybrid password attack
Birthday attack

Types of password attacks

Search for: Types of password attacks

Cross-site scripting

Search for: Cross-site scripting

Command injection attack

Search for: Command injection attack

Zero day exploit

Search for: Zero day exploit

Cookies manipulation

Search for: Cookies manipulation

LSO attach

Search for: LSO attach

Attachment attack

Search for: Attachment attack

Header manipulation security threat

Search for: Header manipulation security threat

Buffer overflow security threat

Search for: Buffer overflow security threat

Integer overflow security threat

Search for: Integer overflow security threat

Ping of death and buffer overflow

Search for: Ping of death and buffer overflow


21 ftp
53 dns
80 http
110 pop3
119 nntp
443 https

popular port scanning programs

Search for: popular port scanning programs

SuperScan Angry IP Scan

Search for: SuperScan Angry IP Scan

Using Wireshark for sniffing network traffic packet snipper

Search for: Using Wireshark for sniffing network traffic packet snipper

man in the middle attach

Search for: man in the middle attach

replay attach

Search for: replay attach

Evil Twin Attach

Search for: Evil Twin Attach

Drive-by download

Search for: Drive-by download

Clickjacking

Search for: Clickjacking

Evil twin is a term for a rogue Wi-Fi access point that appears to be a legitimate one offered on the premises, but actually has been set up to eavesdrop on wireless communications.[1]

An evil twin is the wireless version of the phishing scam. An attacker fools wireless users into connecting a laptop or mobile phone to a tainted hotspot by posing as a legitimate provider.

This type of evil twin attack may be used to steal the passwords of unsuspecting users by either snooping the communication link or by phishing, which involves setting up a fraudulent web site and luring people ther

A user might receive an email with a link to a video about a news item, but another valid page, say a product page on Amazon.com, can be "hidden" on top or underneath the "PLAY" button of the news video. The user tries to "play" the video but actually "buys" the product from Amazon.

Other known exploits include:

Tricking users into enabling their webcam and microphone through Flash

Tricking users into making their social networking profile information public

Making users follow someone on Twitter[8]

Sharing links on Facebook

DDos Attacks

Search for: DDos Attacks

ICMP flood smurf attack

Search for: ICMP flood smurf attack

UDP flood

Search for: UDP flood

SYN flood

Search for: SYN flood

Reflected DOS attack

Search for: Reflected DOS attack

Permanent DOS attack (Phlashing)

Search for: Permanent DOS attack (Phlashing)

xmas attack

Search for: xmas attack

session hijacking

Search for: session hijacking

p2p attacks

Search for: p2p attacks

ARP poisoning

Search for: ARP poisoning

Transitive access attacks

Search for: Transitive access attacks

DNS poisoning

Search for: DNS poisoning

DNS hijacking

Search for: DNS hijacking

Understand wps

Search for: Understand wps

Bluejacking

Search for: Bluejacking

Attacker sending malware to a device via bluetooth

Bluesnarfing

Search for: Bluesnarfing

Attacker stealing data transmitted over bluetooth

war driving chalking

Search for: war driving chalking

netstumbler inSSIDer Kismet Aircrack

Search for: netstumbler inSSIDer Kismet Aircrack


links
tools
key words
key topics

IV attacks

Search for: IV attacks

wireless replay attacks

Search for: wireless replay attacks

Sinkhole attacks

Search for: Sinkhole attacks

Attacker funnels wireless traffic into a single port

Intercepts data

Slows the network

wep and wpa attacks

Search for: wep and wpa attacks

What is TrueCrypt

Search for: What is TrueCrypt

BitLocker

Search for: BitLocker

what is HSM?

Search for: what is HSM?

Go after a directory of encrypted files to secure them from reading

sophos disk encryption

Search for: sophos disk encryption

CCCleaner registry cleaning tool

Search for: CCCleaner registry cleaning tool

xsrf

Search for: xsrf

fuzzing

Search for: fuzzing

xss stored attack and reflected attack

Search for: xss stored attack and reflected attack


Restrict HTML in form fields.
Use input validation.
Restrict cookie information.
Encrypt data communications.
Advise on the ?Remember Me? options.

Managing internet explorer enhanced security configuration

Search for: Managing internet explorer enhanced security configuration

effects of internet explorer enhanced security configuration

Search for: effects of internet explorer enhanced security configuration

blackviper on tuning windows

Search for: blackviper on tuning windows

Continue here with the next class, class 2