Posts

Showing posts from May, 2023

Heartbleed attack against secure communication (OpenSSL) using nmap:

https://www.niii.tech/ nmap -d —script ssl-heartbleed —script-args vulns.showall -sV [host]

CLOUD HACKING - key concepts

  https://www.niii.tech/ CLOUD HACKING - key concepts Virtualization Types os cloud computing: IaaS, PaaS, SaaS, IDaaS, FaaS, SECaaS, CaaS. Container is a package holding components of a single application and all its dependencies, relying on virtual isolation. Docker is the industry leader container management. Docker engine runs various Linux distributions and Windows Server OS. Kubernetes (K8) open source container (developed by Google and now with Cloud Native Computing Foundation). Docker rum i a SINGLE SYSTEM, and K8 runs across CLUSTERS. Deployments models: public, private, community, hybrid and multi. NIST released SP 500-292, NIST Cloud Computing Reference Architecture FedRAMP (Federal Risk and Authorization Management Program) is the regulatory effort regarding cloud computing.  PCI SSC Cloud Computing Guidelines published by the Cloud Special Interest Group PCI Security Standards Council. CSA (Cloud Security Alliance)  Virtualization introduces Hypervisor layer...

Mobile and IoT - key concepts

  https://www.niii.tech/ MOBILE and IoT https://owasp.org/www-project-mobile-top-10/ 2 majors mobile platforms:  Android (google) iOS (apple) Android and iOS have an  1) OS 2) middleware and  3) suite of built-in application (example: AI app Siri (woman’s voice) PERFORM SOME ACTION THATS GRANTS ADMINISTRATIVE (ROOT) ACCESS TO THE DEVICE: Rooting (Android): KingoRoot, TunesGo, OneClickRoot, MTK Droid Jailbreaking (iOS):  Cydia (cydiafree.com) Hexxa Plus (pangu8.com) Apricot (pangu8.com) Yuxigon (yuxigon.com) Techniques of Jailbreaking: 1) Untethered (kenel remain patched (jalbroken) after reboot) 2) Semi-tethered (reboot no longer retains  the patched kernel) 3) Tethered (reboot removes all jailbteaking patches, and may get stuck forever in a loop on start up) BYOD (Bring Your Onn Device) MDM (Mobile Device Management) goal controle enterprise mobiles . MDM solutions: 1) passcodes for unlocking 2) remote locking 3) remote wipe 4) root / jailbreak detection 5...

Connecting Wi-fi on Kali Linux

  https://www.niii.tech/ Kali Linux Terminal > sudo su > service NetworkManager status service NetworkManager restart apt-get update apt-get dist-upgrade reboot NOW WE INSTALL THE DRIVER !!!!! Terminal sudo su > cd Desktop > apt install git >  git clone https://github.com/TadakaSuryaTeja/BroadcomInstaller2021.git > ls > cd BroadcomInstaller2021 > ls > chmod +x Broadcom.sh > ls > ./Broadcom.sh 1) Install Wifi Driver [y/n] > y Kali reboot automaticaly … Login Password Search SSID wifi… Connect

WIRELESS NETWORKS - key concepts

  https://www.niii.tech/ WIRELESS NETWORK 802.11 series of standards is VERY IMPORTANT 802.11a  Speeds up to 54 Mbps 5 GHz range 802.11b 11 Mbps 2.4 GHz 802.11g 54 Mbps 2.4 GHz 802.11n over 100 Mbps Ranges in MIMO format between 2.4 GHz and 5 GHz 802.11i  Extension of the original 802.11 series with security mechanisms for WLAN 802.15.1 Bluetooh 802.15.4  Zigbee 802.16 Wireless metropolitan areas networks (WiMAX) Modulation: encoding method of choice in wireless networks (manipulation properties of a waveform) OFDM (Orthogonal Frequency-Division Multiplexing) and DSSS (Direct-Sequence Spread Spectrum) uses various pieces of a waveform to carry a signal. OFDM works  with several waveforms carrying messages back and forth and the TRANSMISSION MEDIA is divided into a series of FREQUENCY BANDS that do not overlap each other and EACH BANDS CAN CARRY A SEPARATE SIGNAL. DSSS COMBINES ALL AVAILABLE WAVEFORMS and the ENTIRE FRREQUENCY BANDWIDTH can be used for the delive...

SQL injection - Login and password for any website

https://www.niii.tech/ Login and password for any website or form: " or ""=" This is the same SQL statement: SELECT  *  FROM  Users  WHERE  Name = ""   or "" = ""   AND  Pass = ""   or   "" = "" https://www.w3schools.com/sql/sql_injection.asp

TOP critical security risk to web applications: BROKEN ACCESS CONTROL

https://www.niii.tech/ TOP critical security risk to web applications: BROKEN ACCESS CONTROL A01:2021 – Broken Access Control https://owasp.org/Top10/A01_2021-Broken_Access_Control/

System Hacking - key concepts

https://www.niii.tech/ System Hacking - key concepts 1) Windows store hashes of passwords in the SAM file, located in C:\Windows\System32\Config folder. 2) In Microsoft Windowd, if the last 7 characters of the 14 characters of the LM hash is zero (and the password is 7 characters or less), the hash will always be AAD3B435B51404EE. Windows Viata and later LM hash is shown as NO PASSWORD in the SAM file. 3) Salting add protection by adding random data BEFORE hashing. 4) Kerberos is the Windows default authentication method. Kerberos use symmetric and asymmetric encryption. This is how Kerberos works: the client asks a ticket for the KDC (Key Distribution Center) - which holds the AS (Authentication Server) and TGS (Ticket Granting Service) in clear text. The server responds with a key hashed by the password copy kept on the Active Directory: this is the TGT (Ticket Granting Ticket). TGT is is sent back to the server requesting a TGS service ticket, and the server responds with a service ...

160 Operating System alternatives for you to install on your computer, in addition to Windows 10

https://www.niii.tech/   https://alternativeto.net/software/windows-10/?p=2 https://www.pendrivelinux.com/yumi-multiboot-usb-creator/

Cybersecurity for Beginners - Reconnaissance, Scanning, Gaining Access, Maintaining Access and Clearing Tracks

Image
https://www.niii.tech/ click on the photo 👇👇👇👇👇 Online Training  

Ethical Hacking: Social Engineering Training

Image
  https://www.niii.tech/   click on the photo 👇👇👇👇👇  

Programming: Python PCEP Certification Training

Image
https://www.niii.tech/ click on the photo 👇👇👇👇👇                    https://www.niii.tech/                                                

Ethical Hacking - SNIFFING - key concepts

  https://www.niii.tech/ SNIFFING - key concepts Tool: https://www.wireshark.org/ https://www.snort.org/ NIC (Network Interface Card) Promiscuous mode, WinPcap, libPcap Collision Domain SMTP, FTP, SNMPv1, NNTP, IMAP, POP3 ARP_REQUEST ARP_REPLY IPv6, IPv4 Lawful interception, PRISM Port Mirroring MAC Flooding Switch port stealing ARP poisoning IPv4: DHCP-DISCOVER (Solicit, IPv6), DHCP OFFER (Advertise, IPv6), DHCPREQUEST (Request, IPv6), DHCPPACK (Reply, IPv6) MAC spoofing DNS poisoning IRDP spoofing IDS Firewall HTTP tunneling Honeyspot

Enumerating DNS server

https://www.niii.tech/ Windows > cmd >  Identify the EMAIL SERVER: set query=MX HOSTNAME and PORT NUMBER SERVER: set query=SRV Identify the primary name server for the zone: set query=SOA Maps an IP to a hostname (reverse DNS lookups): set query=PTR Defines the name server within your namespace: set query=NS Provides for domain name aliases within your zone: set query=CNAME Maps an IP to a hostname (DNS lookups): set query=A

FOOTPRINTING: zone transfer using nslookup

https://www.niii.tech/ Windows > cmd >  1) nslookup 2) server IP (IP of SOA) 3) set type=any 4) ls -d domainname.com

Enumerating Web Server using NSE (Nmap Script Engine)

https://www.niii.tech/ nmap -sV -O -p <IP> nmap -sV —script http-enum<IP> nmap <IP> -p80 —script=http-frontpage-login nmap —script http-passwd —script-args http-password.root=/<IP>

Bypass IDS fragmenting SYN scan

https://www.niii.tech/ nmap -sS -A -f <IP>