Study Record/Cybersecurity

- Concepts1. CherryTree: A note-taking application used for organizing, storing, and managing hierarchical notes effectively. 2. Hostname vs domain name   - Hostname: Identifies a specific device within a network (e.g., www, mail, ftp, etc.)   - Domain name: The address used over the Internet to locate resources    e.g., www.example.com   - www: hostname   - example.com: domain name 3. www: Host..
1. Pre-Engagement: Educate the client and adjust the contract.2. Information Gathering: Obtain information about the components in various ways3. Vulnerability Assessment: Analyze the results from our 2. Information Gathering stage, looking for known vulnerabilities in the systems. Determine the threat level and the susceptibility of a company's network infrastructure to cyber-attacks4. Exploita..
1. Testing Methods1) External Penetration Test: Perform testing from an external perspective or as an anonymous user on the Internet2) Internal Penetration Test: Perform testing from within the corporate network 2. Types of Penetration TestingThis type determines how much information is made available to us.1) Blackbox: Minimal. Only the essential information (e.g., IP addresses, domains, etc.) ..
- Concpets1. Security snapshot - Quick or comprehensive analysis of a system's security posture at a given point in time. It's commonley used in web vulnerability tools (e.g., OWASP ZAP, Burp suite, Nessus) or integrated security dashboards.2. Fuzzing - Send unexpected, random, or crafted input (e.g, different URLs or parameters) to find vulnerabilities 1) fuff: A super-fast web fuzzing tool w..
[General Concepts and Utilities]- Concepts1. Binding: Associate a specific IP address or port number with a process to receive connections. (e.g., A server binding to port 8080 is ready to accept connects on that port.)2. Terminal vs Shell: - Terminal: A window/interface to interact with the OS - Shell: A program that processes commands and interacts with the OS (e.g., Bash, Powershell)3. Fl..
[Generel Utilities and Concepts]1. Apache: Widely used open-source web server software.2. Proxy: An intermediary server between a client and a destination server.3. HTTPS port: 4434. HTTP response code for not found: 4045. Folder in Web Application Terminology: Directory6. Wappalyzer: Browser plugin analyzing web page technologies7. AD (Active Directory): Directory service for Windows domain net..
1. OWASP Top Ten (Open Web Application Security Project) Provides standards, guides, and resources for web application security.https://owasp.org/www-project-top-ten/ 2. Krebs on SecurityA blog by security journalist Brian Krebs, offering in-depth analysis of cyberattacks, breaches, and trends.https://krebsonsecurity.com/ 3. Dark ReadingNews, threat intelligence, and technical information for se..
[Help for commands]help, -h, --help, man [General Utilities and Concepts]- Key Concepts1. ICMP: Used for sending error messages, status updates, and operational information about network communication. Tools like ping and traceroute use ICMP to test connectivity and measure latency. Unlike TCP and UDP, ICMP does not use ports as it is not intended for direct data transmission.2. TAR archive fil..
1. File System and DirectoriesFilesystem - structure for storing and organizing data (e.g., EXT4, NTFS)/etc - stores system configuration files./var - holds files that frequently change, like logs/dev - directory for device files (e.g., /dev/sda for a hard drive)inode - metadata structure that holds information about filesmount - attaching a directory to a specific filesystem or device 2. Proces..
1. Auto-Complete[TAB] - auto-complete commands 2. Cursor Movement[CTRL] + A - move the cursor to the beginning of the current line.[CTRL] + E - move the cursor to the end of the current line.[CTRL] + [] - Jump at the beginning of the current/previous word.[ALT] + B / F - Jump backward/forward one word. 3. Erase The Current Line[CTRL] + U - Erase everything from the current position of the cursor..
작은 change가 전체 system에 영향 미침따라서 change management 필요 1. fill out a formal change control process formeveryone has to do 2. document in this form the reason that we're making this change= determine the purpose of the change 3. identify the scope of the change 4. schedule a date and time of the change 5. determine affected systems and the impact 6. analyze the risk associated with the change 7. get..
공격자를 속이고 기만하기 1. Honeypots 1) 공격자를 유도해서 공격방식 파악하기 attacker는 주로 '자동화된 프로그램'임그렇다면 honeypot을 이용해attacker가- 어떤 자동화 프로그램을 사용하는지- 어떤 걸 공격하려 하는지 확인하는 것! 2) honeypot은 virtual world임 오직 공격자를 속여 공격 방식 파악하기 위한 (actual system 아님) 3) 공격자는 이게 honeypot인지 actual world인지 계속 discern하려 함. 2. Honeynetssingle device일 뿐인 honeypots을 합쳐서 더 크게! 실제처럼! 3. Honeyfiles가짜 파일 (무조건 파일 형태)누가 해당 파일 접근하면 알람e.g., passwords.txt (pas..
Sungyeon Kim
'Study Record/Cybersecurity' 카테고리의 글 목록 (6 Page)