CYBER OF THINGS 2.0

If you know the enemy and know yourself, you need not fear the result of a hundred battles -Sun Tzu Sharing some pointers wrt some present trends and tactics in the cyber domain and threat intel as law enforcemnt agencies (LEA) perspective. The following information has been taken from some open source reliable vendors and…

THREAT INTELLIGENCE

Threat intelligence is information that informs enterprise defenders of adversarial elements to stop them. It is information that is relevant to the organization, has business value, and is actionable. In this presentation, following are the covered elements: What is Threat Intelligence Cyber Security Mindmap Threat Agents Threat Intel Categories Threat Int Use Cases Important Assets…

TESTIMONIALS

Dear All, Humbled and Thanks all for the recommendations and the review. It’s been great learning as well by sharing the thoughts knowledge. Sharing some testimonials and hope more acquire down : Updated 2018

SMARTPHONE FORENSICS – 2

Greetz to dear reader’s, Digital Forensics (4n6)🕵️‍♂️ itself as one of the emerging domain in information security. And Smartphone forensics is one of them, It is a subset of digital forensics and refers to the investigation and acquisition of artefacts in mobile phones 📲 When we talking about mobile phone forensics then it depends on…

FILELESS MALWARE ATTACKS : INTRO

FILELESS MALWARE ATTACKS Unlike attacks carried out using traditional malware, fileless malware attacks don’t entail attackers installing software on a victim’s machine. This means that there’s NO signature for antivirus software to detect, greatly decreasing the effectiveness of these programs in detecting fileless malware attacks. And these attacks are almost 10 times more likely to…

DIGITAL FORENSICS SKILLSETS

Dear Readers, Thanks for reaching out. The need for computer and digital forensics experts is growing significantly due to the increase in cyberattacks, with digital forensics skillsets becoming a critical element in helping IT security teams learn from security incidents. Computer Forensics is the application of scientific examination and data analysis performed on computer storage…

DEFCON DFIR CTF 2019

Defcon DFIR CTF 2019 writeup – Triage VM 🕵️ This year an unofficial Defcon DFIR CTF was provided by Champlain College’s Digital Forensic Association. They created challenges in 5 topics which are available for anyone for a little practice on this site:defcon2019.ctfd.io. The challenges are sorted into the following categories: DFA Crypto Challenge DeadboxForensics Linux…

PENTESTING RESOURCES

Sharing free resources on pen-testing (penetration testing, PT) It is the practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit. 1: Davy Rogers made a list of YouTube videos from many different creators and put it in a loosely structured order to cover the basics of pentesting…

CYBERSECURITY CERTIFICATIONS -1

Dear Readers 🙏, The Demand for Cyber Security Professionals Is Strong.  Whether you’re just starting off in the cyber-security field or are already working as a security professional, there are many certifications for you to consider across various specializations and difficulty levels. Before jumping to the certifications let’s having look of cyber security mind-map: Top…

WHY OPEN SOURCE THREAT INTELLIGENCE

A file hash is a smoking gun for forensic investigators, Break Down the Open Source Intelligence Knowledge Stack 🕵️‍♂️ Other sites dedicated to compiling information about indicators from the atomic to the behavioural include: Team Cymru’s Community Services portal: This portal includes IP reputation lookup and malware hash analysis. Threatminer: Search by domains, hashes, user-agent…

CYBER THREAT INTELLIGENCE PLATFORMS (TIPS)

European Union Agency for Cybersecurity (ENISA) has released the first comprehensive study on Cyber Threat Intelligence Platforms (TIPs) focused on the needs of TIP users, developers, vendors, and the security research community. So lets brief, what is Threat intelligence platform : Threat Intelligence Platform (TIP) is an emerging technology discipline that helps organizations aggregate, correlate, and analyze threatdata from…

FORENSICS BRUNCH 2

Without a doubt, technology is advancing at an increasingly rapid pace. It’s all about today’s Digital Security and increasing Cyber-Crime information. If you want to play a role in fighting these cybercrime threats, then you’ll want to know how to become a digital forensic examiner. Sharp knowledge and Computer soundness may lead you ahead and…

EQUIFAX DATA BREACH

Equifax Hackers Demanding $2.6 Mln in Bitcoin, Or Else Expose 143 million Americans Private Info Equifax data breach may affect nearly half the US population. Three Equifax execs sold $1.8 million of stock days after breach discovery. But before it was made public. Equifax Inc. is a consumer credit reporting agency in the United States,…

OIL & GAS ENERGY INDUSTRIES: CYBER THREATS

Cyber Domain “Fifth Domain of Warfare” 🌍 Cyber-attacks on the energy sector, and on oil and gas facilities, have increased in the past five years along with the associated costs. The scale and severity of attacks on industrial cyber systems are growing. For the oil and gas sector – like other sectors – it continues…

FORENSICS BRUNCH 1

Greetings : Sharing some resources 1: Digital Forensic Challenge Images (Datasets) https://www.ashemery.com/dfir.html 2: Hidden Networks: Detecting Hidden Networks created with USB Devices https://drive.google.com/drive/folders/0ByczHyAbM7lDLVlfRGhDWHJadzA?usp=sharing 3: Gordon Fraser’s paper, which walks through the IR process after an attack on “A fictitious organization, Winterfell” #SANS https://www.sans.org/reading-room/whitepapers/incident/practical-incident-response-network-based-attack-37920 4: Six Skills Required For A Career In Digital Forensics https://www.forbes.com/sites/laurencebradford/2017/04/29/6-skills-required-for-a-career-in-digital-forensics/#65e5deb87fa6 5:…

एक सैनिक की जुबानी : ARMY

एक सैनिक की जुबानी Sabse pahle mera desh, Sharing one OT post. #Jai_Hind हम दोनों ने 18 की उम्र में घर छोड़ा, तुमने JEE पास की मेने Army के लिए Test पास की तुम्हे IIT मिली, मुझे Army   तुमने डिग्री हांसिल की, मेने कठोर प्रशिक्षण,   तुम्हारा दिन सुबह 7 से शुरू होकर शाम…

FORENSICS TUTORIAL-1

Computer forensics is the practice of collecting, analyzing and reporting on digital data in a way that is legally admissible. It can be used in the detection and prevention of crime and in any dispute where evidence is stored digitally. Computer forensics follows a similar process to other forensic disciplines and faces similar issues. Although…

FORENSICS BRUNCH 0

Some Important resources might helpful. Forensics week Update 1 : Spot faked photos using digital forensic techniques http://www.popsci.com/use-photo-forensics-to-spot-faked-ima… 2 : Trickbot Malware Now Targets US Banks Researchers with IBM and Flashpoint warn the Trickbot Trojan is growing more… https://t.co/V2w5eI0McF 3 : API Hooking – Evading Traditional Detection with Stealthy New Techniques https://www.infosecurity-magazine.com/…/api-hooking-evadin…/ 4 : Drone…