Monday, September 09, 2024
1. You have the following \ given information: You are a SOC analyst who just started his employment in a Bank environment Durin...
Sr SOC Analyst Test L3 Questionnaires
2. You oversee the Incident Response & Digital forensic investigations.
During your shift, you receive a complaint from a customer saying that he is concerned that at least 5 endpoints from his DEVOPS team are infected with suspicious \ malicious files.
I. Please describe and elaborate on your IR & Forensic analysis. Please share your methodology.
Answer:
As an Incident Response (IR) and Digital Forensics investigator, handling the customer’s complaint regarding potentially infected DEVOPS endpoints requires a structured and methodical approach to both incident response and forensic analysis.
1. Incident Response (IR) Phase:
The objective of the IR process is to quickly contain and mitigate the threat while minimizing further damage.
Step 1: Initial Triage and Containment
Start by gathering more details from the customer about the suspicious activity or malware. Ask for:
- Symptoms observed on the endpoints (e.g., performance degradation, suspicious pop-ups)
- Any abnormal behavior (e.g., unknown processes, increased network traffic)
- Logs or alerts from their endpoint protection tools, if available.
- Isolation of Suspected Endpoints: Instruct the DEVOPS team to isolate the suspected endpoints from the network to prevent potential spread or further compromise. This can be done by disconnecting from the network or moving the devices to a quarantine VLAN.
- Initial Threat Identification: Review available endpoint detection and response (EDR) tools or antivirus logs to gather initial information about the malware or suspicious files. Look for:
- Unusual running processes
- Changes in file integrity
- Suspicious outbound connections
Step 2: Initial Analysis
- Gather Logs and Data: Collect system logs (e.g., Windows Event Logs, syslogs) from the endpoints, as well as any suspicious file hashes for further investigation.
- Hash Analysis: Use the file hashes (MD5, SHA-256) of the suspicious files to check known malware databases (VirusTotal, Hybrid Analysis) to see if they match any known malware signatures.
- Network Traffic Analysis: If available, use network traffic logs to analyze if the endpoints are communicating with any known malicious IPs or domains.
- Endpoint Behavior Review: Use EDR tools to determine if any unusual file modifications or process executions occurred on the systems.
Step 3: Containment and Eradication
- Determine the Scope: Confirm whether the infection is limited to the reported five endpoints or if it has spread to other devices within the network. Use endpoint scanning tools to identify other potentially compromised systems.
- Block communication between infected endpoints and external sources, if necessary.
- Temporarily disable user accounts that may have been compromised.
Remove the malicious files or clean the infected endpoints using antivirus or malware removal tools. If necessary, reinstall the OS on compromised machines to ensure complete removal.
2. Digital Forensic Investigation Phase:
Once the immediate threat is contained, the next step is to conduct a forensic analysis to understand the root cause and full impact of the compromise.
Step 1: Forensic Data Acquisition
- Create Forensic Images: Take full disk images of the infected systems for analysis. This ensures you have a snapshot of the system at the time of compromise for later investigation without altering the evidence.
- Memory Dump Collection: If possible, collect RAM dumps to analyze active processes and network connections that were active at the time of infection.
- Network Traffic Capture: Capture network traffic related to the endpoints, such as packet captures (PCAPs), to trace communications with external IPs or malicious actors.
Step 2: Forensic Analysis
- Construct a timeline of events leading up to the infection. This helps identify when the compromise occurred and how the attackers gained access.
- Correlate log files, file creation/modification times, and network traffic to build this timeline.
- Malware Analysis:
- If the malicious files are new or not well-known, conduct static analysis to inspect the malware’s code and dynamic analysis by running it in a sandbox environment to observe its behavior.
- Determine how the malware operates: Does it steal data? Does it create backdoors? Does it attempt lateral movement to other endpoints?
- Log Analysis: Review system and application logs (e.g., web server logs, system authentication logs) to look for unusual login attempts, file access, or privilege escalations.
- Look at Windows Registry changes or scheduled tasks that may indicate persistence mechanisms (e.g., registry keys or autorun entries).
Step 3: Root Cause Analysis
- Identify Entry Point: Analyze how the malicious files were introduced. Common vectors include:
- Phishing emails
- Malicious software downloads
- Compromised websites or developer tools
- Misconfigured cloud infrastructure or weak SSH keys
- Assess the Full Scope: Check if the DEVOPS team's access control policies, network configurations, or application vulnerabilities were exploited by the attacker.
- Determine if any sensitive data (such as source code or proprietary information) was exfiltrated by reviewing network logs and outbound traffic.
3. Post-Incident Activities:
Once the investigation is complete, the focus shifts to improving security and documenting findings.
Step 1: Recovery
- After the forensic investigation is complete, ensure that the compromised endpoints are fully cleaned and patched. Reinstall systems if necessary.
- Restore Systems: Bring the cleaned endpoints back online after verifying that they no longer contain malicious files and that the infection has not spread.
Step 2: Reporting and Documentation
- Write a detailed report on the incident, including the following:
- The timeline of the attack
- The scope of the infection
- Actions taken for containment and eradication
- Recommendations for preventing similar incidents in the future
- Present findings to the DEVOPS team, along with recommendations for securing their systems, such as implementing better security controls, hardening systems, and ensuring endpoint monitoring.
Step 3: Lessons Learned & Recommendations
- Hold a debrief meeting with relevant stakeholders to discuss what went wrong, what worked well, and how to improve security.
- Based on the root cause, recommend and implement security improvements such as:
- Strengthening access controls and network segmentation
- Improving patch management processes
- Deploying advanced threat detection tools (EDR/XDR)
- Conducting regular security awareness training for the DEVOPS team
Methodology Summary:
1. Incident Response:
- Triage → Contain → Investigate → Eradicate
2. Forensic Investigation:
- Data Acquisition → Analysis (Timeline, Malware, Logs, Registry) → Root Cause Analysis
3. Post-Incident:
- Recovery → Documentation → Lessons Learned → Security Improvements
This structured methodology ensures a swift response to the incident, a thorough understanding of how the endpoints were compromised, and steps for long-term improvements to prevent future incidents.
3. A customer receives IR services from you.
A request was received from the customer in the following manner:
"Hello,
We received a warning from the AV system about abnormal behavior. Our system man activated a re-scan of the AV system but found no findings. It also found a temporary folder containing the quasar.exe file in the Temp.
For your information, we are not sure the event has ended.
Regards,
John Arckhant Bank of South America - CISO Group "
I. Is the event over?
II. f not, what is the process that should be done now?
Answer:
The situation described suggests that the event is not necessarily over, even though the antivirus (AV) re-scan did not detect any malicious findings. The presence of the quasar.exe file in a temporary folder raises serious concerns because Quasar RAT (Remote Access Trojan) is a known malicious tool used for remote access, credential theft, data exfiltration, and backdoor creation.
1. Is the Event Over?
- No, the event is likely not over. The antivirus re-scan showing no findings does not necessarily mean that the threat has been fully neutralized. The Quasar RAT, being a sophisticated tool, may have avoided detection or left additional persistence mechanisms that are not being flagged by the AV software. The lack of AV findings could also indicate that the malware has modified its behavior or has been partially removed but may still have traces remaining, such as backdoors or other compromised assets.
2. Immediate Actions and Incident Response Process
Since the event may still be ongoing, the following steps should be taken to fully investigate, contain, and resolve the incident:
Step 1: Isolate the Affected System
- Immediately isolate the affected system from the network to prevent further spread or communication with command-and-control (C2) servers. Quasar RAT is known to communicate with external servers, and isolation will prevent data exfiltration or further remote control.
- Temporarily suspend any user accounts associated with the affected machine to avoid further exploitation if credentials have been compromised.
Step 2: Identify the Extent of the Compromise
- Conduct a deep analysis of the running processes and memory to look for any indicators of compromise (IOCs). Focus on:
- Unusual or hidden processes
- Any active network connections or suspicious communication to external IPs
- Collect all relevant artifacts, such as logs, temporary files, and the `quasar.exe` file. This file should be further analyzed in a sandboxed environment to determine its behavior.
- Review Logs: Gather and review system logs (e.g., Event Logs, AV logs, security logs) to trace any abnormal behavior leading up to the event:
- Unexpected logins or account activity
- Failed login attempts or privilege escalations
- Any signs of lateral movement within the network
Step 3: Advanced Threat Detection
- Perform a deeper scan using more sophisticated security tools such as Endpoint Detection and Response (EDR) solutions, as the AV may not detect advanced malware or persistence mechanisms. EDR tools can detect:
- Malware persistence techniques
- Lateral movement attempts
- Hidden backdoors or rootkits
- Investigate how Quasar RAT may have established persistence. Quasar often achieves persistence via registry modifications, scheduled tasks, or autorun entries. These should be reviewed and cleaned up.
Step 4: Containment and Eradication
- Once detected, take steps to fully remove the Quasar RAT from the system. This may involve:
- Deleting malicious files and registry entries
- Stopping and removing any associated malicious services or scheduled tasks
- Rebuilding the system from a clean backup if full remediation is difficult
- Ensure that the system is fully patched, including any software or vulnerabilities that might have been exploited to introduce the malware. Check for weak or compromised credentials and force password changes where necessary.
Step 5: Network-wide Investigation
- Investigate whether the malware has spread to other systems in the network. Quasar RAT can be used to move laterally, so scanning other systems, particularly those that the infected machine had access to, is essential.
- Deploy network-wide scanning to look for known IOCs associated with Quasar RAT, such as specific C2 communication patterns or file hashes.
Step 6: Post-Incident Investigation and Reporting
- Perform a forensic analysis of the `quasar.exe` file and any related files or logs. This may involve static and dynamic analysis to understand how the malware was introduced, its exact capabilities, and the potential data that might have been compromised.
- Determine how the malware entered the environment (e.g., phishing, malicious downloads, drive-by attack) and whether any other vulnerabilities were exploited.
- Compile a detailed report for the customer outlining:
- The timeline of the event
- The actions taken for containment and eradication
- Any vulnerabilities or weaknesses identified
- Recommendations for improving security and preventing future attacks
Step 7: Lessons Learned and Security Improvements
- Based on the root cause analysis, implement the following:
- Ensure proper patching and vulnerability management for all endpoints.
- Enhance network segmentation to limit the scope of future attacks.
- Strengthen endpoint detection capabilities to catch sophisticated malware.
- Conduct regular security awareness training for employees to prevent phishing or social engineering attacks.
- Set up ongoing monitoring for any signs of remaining malware or suspicious activity, such as unusual network traffic or file changes.
Conclusion:
The event is likely not over, as the presence of the quasar.exe file points to the possibility of an advanced malware infection, such as Quasar RAT. Immediate action should be taken to isolate the affected system, investigate the full extent of the compromise, and eradicate the malware. Additionally, a deeper forensic investigation is required to fully understand the impact and prevent further incidents.
4. A customer expresses his fear of insider attacks.
I. What attacks can be executed by an insider?
II. How would you detect these attacks?
III. How would you reduce the risk of a successful insider attack?
Answer:
Insider attacks are particularly dangerous because insiders often have legitimate access to sensitive systems, making it easier for them to bypass security controls and cause significant damage. Here’s how to understand and mitigate the risks of insider attacks:
1. What Attacks Can Be Executed by an Insider?
Insiders can execute a variety of malicious activities depending on their level of access and intent. The most common types of insider attacks include:
a. Data Theft or Espionage
- (e.g., intellectual property, customer data, financial records) for personal gain or to sell to competitors or malicious third parties.
- where an employee steals proprietary information before leaving the company.
b. Sabotage
- Destruction or modification of critical systems or data, either to disrupt business operations or as an act of revenge against the organization.
- Deleting or corrupting databases or files, which can lead to data loss or system downtime.
c. Privilege Abuse
- Abusing elevated privileges to access and misuse systems or data that are outside their normal job responsibilities. For example, an IT admin might create backdoors or disable security controls.
- Unauthorized access to confidential systems by exploiting legitimate credentials.
d. Social Engineering
- Using knowledge of internal processes to manipulate other employees into providing access to sensitive systems or information.
- Phishing campaigns initiated by an insider targeting their colleagues.
e. Fraud and Financial Manipulation
- Altering financial data or reports for personal financial gain or to commit fraud.
- Embezzlement by exploiting their access to financial systems to siphon funds or tamper with accounting records.
f. Insider Collusion with External Actors
- Collaboration with external threat actors, providing them with access to internal systems in exchange for money or other benefits.
- Assisting in external attacks by disabling security controls or providing sensitive information (e.g., passwords or network details).
---
2. How Would You Detect These Attacks?
Detecting insider attacks can be challenging, but with the right tools and procedures in place, the risks can be mitigated. Key techniques for detecting insider threats include:
a. User and Entity Behavior Analytics (UEBA)
- UEBA tools use machine learning and statistical analysis to detect anomalous behavior in users' actions. Suspicious activities like accessing files or systems they don’t normally interact with, downloading large volumes of data, or accessing the system outside of normal working hours can raise alerts.
- UEBA tools create a behavioral baseline for each user and flag deviations from this normal behavior (e.g., unusual data transfers or excessive file access).
b. Access Monitoring and Logging
- Monitor privileged accounts: Track and log all actions performed by users with elevated privileges (e.g., system administrators, developers) to identify abuse of access rights.
- File access logging: Use Data Loss Prevention (DLP) solutions and logging mechanisms to monitor access to sensitive data, ensuring any unauthorized access or exfiltration attempts are detected.
c. Network Traffic Analysis
- Monitor network traffic to detect unusual patterns, such as large data transfers to external locations, use of encrypted channels for suspicious purposes, or access to restricted internal systems.
- Data exfiltration detection: Use tools to flag abnormal outgoing traffic (e.g., copying files to external USB devices, uploading to cloud services, or emailing sensitive information).
d. Email and Communication Monitoring
- Email monitoring tools can detect suspicious communications, such as the transmission of confidential files to personal email addresses or external parties.
- Keyword monitoring: Set up rules to flag specific keywords associated with sensitive data or business operations in emails, chats, or documents.
e. Monitoring Use of External Devices
- Track and limit the use of USB drives and external storage devices to prevent data exfiltration. Alerts should be generated if unauthorized devices are connected to sensitive systems.
- DLP solutions can block or alert on data transfers to unauthorized devices.
f. Role-Based Access Control (RBAC) Audits
- Perform regular audits of user roles and access levels to ensure that employees have only the permissions necessary for their job. This can help detect when an insider is accessing information they shouldn’t.
- Review access logs regularly to detect unusual patterns, such as users accessing files, applications, or systems outside their normal role.
g. Security Information and Event Management (SIEM)
- SIEM tools collect and correlate security data across various systems to detect suspicious activity. SIEM solutions can flag irregular logins, unauthorized access, unusual network traffic, and other indicators of insider threats.
- Correlate different data sources: SIEM solutions can detect a combination of anomalies that together suggest an insider threat (e.g., downloading sensitive data followed by an unexpected external connection).
---
3. How Would You Reduce the Risk of a Successful Insider Attack?
To reduce the risk of insider threats, you can implement a combination of technical controls, policy enforcement, and behavioral awareness. Key risk-reduction strategies include:
a. Implement Least Privilege Access (Principle of Least Privilege)
- Restrict access to systems and data so that employees only have access to the information they need to do their job. This limits the damage that can be done by insiders.
- Regularly review and update access controls: Ensure that permissions are regularly audited, especially when employees change roles or leave the organization.
b. Monitoring and Alerts
- Set up comprehensive monitoring of user activities, especially those with privileged access, to detect abnormal behavior in real time. Implement strong logging for all critical systems, file access, and network connections.
- Automate alerts for suspicious activities, such as unauthorized access to sensitive files, abnormal login times, or unusual data transfers.
c. Separation of Duties (SoD)
- Divide key tasks among multiple employees to reduce the risk of an individual insider
5. Please choose one of the attacks that you mentioned above in the previous question and provide details:
I. Scenario specification
II. Handling process
Answer:
4. Insider Attacks:
Insider threats occur when someone within the organization (an employee, contractor, or third party) misuses their access to carry out malicious activities, either intentionally or accidentally. Here’s an overview:
Types of Insider Attacks:
1. Data Theft and Exfiltration:
- The insider steals sensitive data (e.g., intellectual property, customer data, financial records) and exfiltrates it, typically through removable media (USB drives), email, or cloud storage.
2. Privilege Escalation:
- An insider with limited access escalates their privileges to gain unauthorized access to sensitive systems, applications, or data.
3. Sabotage:
- The insider intentionally damages or disrupts systems, such as deleting critical files, introducing malware, or corrupting databases.
4. *Fraud and Financial Theft*:
- Using their access to manipulate financial records, authorize unauthorized transactions, or alter billing systems for personal gain.
5. Espionage:
- An insider may work as a spy, providing sensitive information (e.g., trade secrets, strategies) to competitors or nation-state actors.
6. Installation of Backdoors or Malware*:
- An insider may plant backdoors, keyloggers, or other malware to maintain access or compromise critical systems at a later time.
7. Social Engineering Support:
- Insiders can assist external attackers by providing them with sensitive information or credentials needed for successful attacks.
How to Detect Insider Attacks:
1. User Behavior Analytics (UBA):
- Analyze user activity patterns (file access, login times, system commands). Unusual activity, such as accessing data at odd times or large data transfers, could signal insider threats.
2. Monitoring Data Exfiltration*:
- Implement data loss prevention (DLP) solutions to track and prevent unauthorized file transfers or access to sensitive files.
3. Access Logs and Auditing:
- Regularly review access logs, especially for privileged users. Look for unusual access attempts or patterns, such as accessing files unrelated to their work.
4. Endpoint Detection and Response (EDR):
- Monitor endpoints for suspicious activities such as unauthorized applications being run, unauthorized USB device usage, or unapproved changes to system files.
5. Anomalous Network Traffic:
- Monitor network traffic for abnormal patterns, such as unexpected external connections, large amounts of outbound data, or access to restricted zones.
6.Privileged Access Monitoring:
- Use privileged access management (PAM) tools to control and monitor the actions of users with administrative rights. Detect changes in configurations, unauthorized installations, or database modifications.
How to Reduce the Risk of Insider Attacks:
1. Least Privilege Principle*:
- Limit access to only what is necessary for employees to perform their jobs. Regularly review access permissions and revoke them when no longer needed.
2. Separation of Duties:
- Divide responsibilities among multiple users so that no one individual has excessive power over a sensitive system or process (e.g., one person cannot both authorize and execute financial transactions).
3. Data Encryption and Access Control:
- Encrypt sensitive data both at rest and in transit. Implement strict access controls to limit access to sensitive files and databases.
4. Monitoring and Auditing:
- Continuously monitor systems, databases, and access logs. Regular auditing of user activities can help detect suspicious actions early.
5. Behavioral Monitoring:
- Implement systems that monitor user behaviors and flag anomalies. For example, an employee downloading large volumes of data they don’t typically access should trigger an alert.
6. Employee Education and Awareness:
- Provide regular training on the importance of security, best practices for data protection, and warning signs of malicious activities.
7. Whistleblower Programs:
- Encourage employees to report suspicious activities within the company anonymously.
This scenario outlines the potential damage of a data theft and exfiltration attack by an insider and highlights the steps necessary to detect, respond to, and prevent future attacks.
Reference:
Image is from kingsland University.
Cyberproof tm, If this article concerns the producer, please contact me, I will remove it if it violates your policies.
Thank you, enjoy !!
Wednesday, September 04, 2024
A research paper on the role of a Tier 1 Security Analyst in a Security Operations Center (SOC) should be structured as follows:...
The Role of a Tier 1 Security Analyst in a Security Operations Center (SOC)
Tuesday, February 20, 2024
Security Affairs has published nine methods by which cyber attacks exploit public Wi-Fi wireless networks LANs (free Wi-Fi) . Following are ...
9 POSSIBLE WAYS HACKERS CAN USE PUBLIC WI-FI TO STEAL YOUR SENSITIVE DATA
Security Affairs has published nine methods by which cyber attacks exploit public Wi-Fi wireless networks LANs (free Wi-Fi).
Following are the 9 possible types of cyber attacks and its countermeasures. (☆ For detailed information on the attack methods, please refer to the reference link below)
1. Man-in-the-middle attack (MITM): An attack method that intercepts and alters communications between two parties in the middle. In public wireless LANs, transmitted data may not be encrypted, making it easy for threat actors to gain unauthorized access.
Countermeasures: Use https connections. Do not enter data if the browser displays a warning about the site's authenticity.
2. Fake Wi-Fi connection: A public wireless LAN environment that is nearly identical to the real one installed by the attacker. Users may unknowingly connect to the fake environment and all communications maybe intercepted.
Countermeasures: Be aware if two or more Wi-Fi access points with similar names are displayed, all but one or all may be malicious connections. If you cannot identify a secure connection, it is recommended that you ask the staff members who manages the public wireless LAN.
3. packet sniffing: A method of illegally capturing communication data packets passing through a public wireless LAN. The communication data can be saved and analyzed later. This method is not necessarily illegal in some countries or regions.
Countermeasures: Use a trusted VPN (Virtual PrivateNetwork) to encrypt all communications and ensure the websites you use have SSL/TLS (Secure Sockets Layer/ Transport Layer Security) Certificates.
4. Sidejacking (Session hijacking): Connection Hijacking using illegally obtained session information. Although authentication information such as passwords is not directly compromised, it is possible to perform various operations by pretending to be someone else.
Countermeasures: Always sign out (log out) after using online sites. Avoid leaving any active sessions, and forcibly close any sessions that you do not remember.
5. Shoulder Surfing: Sometimes, the simplest scams are most effective. Shoulder surfing involves someone watching over your shoulder as you type in passwords or other personal information.
Countermeasures: Be aware of your surroundings and who might be watching you. If you're unsure avoid entering sensitive information or use a privacy screen to block prying eyes.
6. DNS spoofing: DNS (Domain Name System) is the internet's phone book, translating domain names into IP addresses. Hackers can manipulate DNS settings to redirect your internet traffic to malicious websites, even if you entered the correct web address.
Countermeasures: Use a trusted service that provides DNS encryption or use a trusted VPN service.
7. Wi-Fi phishing: Similar to phishing scams, users are directed to a malicious Wi-Fi environment. This attack may include the fake Wi-Fi connection described as email phishing scams.
Countermeasures: Do not use public wireless LANs that require users to enter personal information.
Always verify the authenticity of Wi-Fi networks before connecting, especially in public places.
8. Rouge Access Points: Hackers can set up their own wireless access points in public spaces, posing as a legitimate hotspots. Once connected, they can monitor and capture user's data or launch attacks on their devices.
Countermeasures: Use trusted VPN service.
9. Keylogger: Keylogger are malicious software or hardware devices that record keystrokes on a computer or mobile devices. If a hacker manage to install a Keylogger on a public computer or compromised devices, they capture username, passwords, and other sensitive information entered by users.
Countermeasures: Avoid using public computers for sensitive activities like online banking or shopping or entering passwords. If you must use a public computer, consider using virtual keyboard or typeing sensitive information in a secure document and then copy/paste it into the intended fields.
Always be aware of these attacks, as attackers will use any means to steal authentication information.
Conclusion: While public Wi-Fi offers convenience and connectivity, it also presents numerous security risks. When you change your virtual location on an iPhone, computer, or any endpoints devices and hide your real IP addresses, you can protect yourself from potential security threats. However if you have no choice but to use free Wi-Fi, you can use it relatively safely by taking the above measures. You will never know when and in what form a cyber attack may occur. Therefore, we must be on high alert for attacks and take protective security measures.
It is crucial to remain vigilant and take proactive steps to protect oneself in a increasingly interconnected digital world.
Reference: Security Affairs "9 Possible ways hackers can use public Wi-Fi to steal your sensitive data."
https://securityaffairs.com/159003/security/public-wi-fi-attacks.html
Saturday, February 03, 2024
● Unofficial Study Notes of 20 Modules That Help You Master the Foundations of Ethical Hacking and Prepare to Take the C|EH Certification Ex...
Certified Ethical Hacker C|EHv12 Self-study Notes
● Unofficial Study Notes of 20 Modules That Help You Master the Foundations of Ethical Hacking and Prepare to Take the C|EH Certification Exam
All 20 Modules in a single file:
Module01 Introduction to Ethical Hacking
https://www.ukmandal.com.np/p/module01-introduction-to-ethical-hacking.html
Module02 Footprinting and Reconnaissance
https://www.ukmandal.com.np/p/module02-footprinting-and-reconnaissance.html
Module03 Scanning Networks
https://www.ukmandal.com.np/p/module03-scanning-networks.html
Module04 Enumeration
https://www.ukmandal.com.np/p/module04-enumeration.html
Module05 Vulnerability Analysis
https://www.ukmandal.com.np/p/module05-vulnerability-analysis.html
Module06 System Hacking
https://www.ukmandal.com.np/p/module06-system-hacking.html
Module07 Malware Threats
https://www.ukmandal.com.np/p/module07-malware-threats.html
Module08 Sniffing
https://www.ukmandal.com.np/p/module08-sniffing.html
Module09 Social Engineering
https://www.ukmandal.com.np/p/module09-social-engineering.html
Module10 Denial-of-Service
https://www.ukmandal.com.np/p/module10-denial-of-service.html
Module11 Session Hijacking
https://www.ukmandal.com.np/p/module11-session-hijacking.html
Module12 Evading IDS, Firewalls, and Honeypots
https://www.ukmandal.com.np/p/module12-evading-ids-firewalls-and.html
Module13 Hacking Web Servers
https://www.ukmandal.com.np/p/module13-hacking-web-servers.html
Module14 Hacking Web Applications
https://www.ukmandal.com.np/p/module14-hacking-web-applications.html
Module15 SQL Injection
https://www.ukmandal.com.np/p/module15-sql-injection.html
Module16 Hacking Wireless Networks
https://www.ukmandal.com.np/p/module16-hacking-wireless-networks.html
Module17 Hacking Mobile Platforms
https://www.ukmandal.com.np/p/module17-hacking-mobile-platforms.html
Module18 IoT and OT Hacking
https://www.ukmandal.com.np/p/module18-iot-and-ot-hacking.html
Module19 Cloud Computing
https://www.ukmandal.com.np/p/module19-cloud-computing.html
Module20 Cryptography
https://www.ukmandal.com.np/p/module20-cryptography.html
Popular Posts
Recent Posts
Popular Posts
-
Security Affairs has published nine methods by which cyber attacks exploit public Wi-Fi wireless networks LANs (free Wi-Fi) . Following are ...
-
Cyber Security (CS): Cyber Security is becoming increasingly complex day by day. Many organizations offer resources and information ...
-
As we all know, working and living anywhere is essential and important for a better life. We all have dreamed of quality of life, good healt...
Recent Posts
Translate
Featured Post
Popular
-
Security Affairs has published nine methods by which cyber attacks exploit public Wi-Fi wireless networks LANs (free Wi-Fi) . Following are ...
-
Cyber Security (CS): Cyber Security is becoming increasingly complex day by day. Many organizations offer resources and information ...
-
As we all know, working and living anywhere is essential and important for a better life. We all have dreamed of quality of life, good healt...
-
1. You have the following \ given information: You are a SOC analyst who just started his employment in a Bank environment Durin...
-
Introduction In this step by step tutorial, I'm going to perform Login and CRUD operations in ASP.NET Web API using Angular 9 Web applic...