Skip to content

Beginner guide to various cyber-security concepts and tools

Notifications You must be signed in to change notification settings

PSR009/Cyber-Security

Repository files navigation

Cyber Security

A beginner's guide to various cybersecurity concepts and tools

Note - Only for education purpose

Contents

Setup

  • Access the DarkWeb via VPN → Tor .onion;
    • Use proxychains4 to setup multiple SOCKS5 proxies as Threat Actors could control exit and entry nodes
      • Add proxies here : /etc/proxychain4.conf
      • Get free proxies from SPYS.ONE that have the least latency but these have to be tested
      • Usage : proxychains4 <application/cmd-line>
      • Make sure the service of Tor is running : sudo service tor start
      • Tyres of Chaining available - Dynamic, Strict, Round Robin, Random (Hard for HTTPS)
      • Always leave the proxy_dns enabled
    • More Tor nodes or longer chains provide more security but speed degrades
    • Search : ahmia.fi
    • Use firewall like Pfsense and make sure only the required ports are open
  • Testing
  • OS
    • The safest is to run Tails OS only on a USB
      • This erases any downloaded files removing your footprint
      • Make sure internet connection is turned off when accessing these downloaded files
    • Whonix has a gateway and workstation for access via Tor
    • Kali Linux and Ubuntu require manual setting up of Tor

Others

Domain Controller

  • Command to fetch the domainrole

    > wmic computersystem get domainrole
    
    Value DomainRole
    0x0 Standalone Workstation
    0x1 Member Workstation
    0x2 Standalone Server
    0x3 Member Server
    0x4 Backup Domain Controller
    0x5 Primary Domain Controller

References

YouTube Channels
David Bombal
HackerSploit
John Hammond
Network Chuck
Nour's tech talk
LiveOverflow
stacksmashing
The Cyber Mentor
Reverse Engineering / Malware Analysis
Dr Josh Stroschein
DuMp-GuY TrIcKsTeR
HEXORCIST
OALabs
Malfind Labs
MalwareAnalysisForHedgehogs
Neil Fox
The PC Security Channel

About

Beginner guide to various cyber-security concepts and tools

Resources

Stars

Watchers

Forks