SOME IMPORTANT LINKS

Sharing some references for study purposes   1: SANS Whitepapers: https://www.sans.org/reading-room/whitepapers/forensics/1906.php 2: CISSP Cookbook https://drive.google.com/open?id=0ByczHyAbM7lDT0ZmUVl1SDJ4R2s 3: C3 Cyber: www.slideshare.net/Deepakniit14/c3-11-sep 4: Slideshare resources: www.slideshare.net/Deepakniit14 5: Python: https://drive.google.com/open?id=0ByWO0aO1eI_MQzRhNXJocjgzczQ 6: Edward Snowden Data Breach: https://www.slideshare.net/Deepakniit14/edward-snowden-databreach 7: Cyber Security Career: https://www.slideshare.net/Deepakniit14/information-security-34067666 8: Some other resources: https://drive.google.com/open?id=0ByczHyAbM7lDNzR6RDV5MnhOWnM  9: Linux: https://drive.google.com/open?id=0ByWO0aO1eI_Mb3ltMFNMUVlXRjQ  10: Computer Forensic Glossary: https://drive.google.com/open?id=0ByczHyAbM7lDSFB4RUVFUU1TTVE 11: SQL Server Database Forensic BlackHat: https://www.blackhat.com/presentations/bh-usa-07/Fowler/…/bh-usa-07-fowler.pdf List will update continuously : Last updated 25 Feb 2017 … More SOME IMPORTANT LINKS

INFO-SEC RELATED CHEAT SHEETS

PENETRATION TESTING CHEAT SHEETS Mobile Application Pentesting: https://www.peerlyst.com/posts/mobile-application-penetration-testing-cheat-sheet Nmap : https://pen-testing.sans.org/blog/2013/10/08/nmap-cheat-sheet-1-0/ Nmap (Not printable): https://hackertarget.com/nmap-cheatsheet-a-quick-reference-guide/ Nmap 5(older version): https://nmapcookbook.blogspot.lu/2010/02/nmap-cheat-sheet.html Nmap 5 (older version, printable) http://www.cheat-sheets.org/saved-copy/Nmap5.cheatsheet.eng.v1.pdf   Java-Deserialization https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet Metasploit https://www.tunnelsup.com/metasploit-cheat-sheet/ Another Metasploit: http://resources.infosecinstitute.com/metasploit-cheat-sheet/ Powerupsql https://github.com/NetSPI/PowerUpSQL/wiki/PowerUpSQL-CheatSheet Scapy https://pen-testing.sans.org/blog/2016/04/05/scapy-cheat-sheet-from-sans-sec560# HTTP Status codes: http://suso.suso.org/docs/infosheets/HTTP_status_codes.gif Beacon https://github.com/HarmJ0y/CheatSheets/blob/master/Beacon.pdf Powershellempire https://github.com/HarmJ0y/CheatSheets/blob/master/Empire.pdf Powersploit https://github.com/HarmJ0y/CheatSheets/blob/master/PowerSploit.pdf PowerUp https://github.com/HarmJ0y/CheatSheets/blob/master/PowerUp.pdf PowerView https://github.com/HarmJ0y/CheatSheets/blob/master/PowerView.pdf Vim https://people.csail.mit.edu/vgod/vim/vim-cheat-sheet-en.pdf Attack Surface Analysis XSS Filter … More INFO-SEC RELATED CHEAT SHEETS

PHISHING : Tips & Examples

Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication. (WiKi) SOME EXAMPLES 10 TIPS TO PREVENT PHISHING ATTACKS Learn to Identify Suspected Phishing Emails There are some qualities that identify an … More PHISHING : Tips & Examples

PAYMENT CARD FRAUD PREVENTION ALERT

Credit and debit cards have become indispensable to modern commerce. However, because fraudsters are continually devising new ways to try to steal card details, cardholders need to take steps to reduce their risk of being defrauded. Phishing is when fraudsters pretending to be from well-known companies, organizations, or government agencies contact consumers and try to … More PAYMENT CARD FRAUD PREVENTION ALERT

CYBER RISK SELF-ASSESSMENT CHECKLIST

CYBER RISK SELF-ASSESSMENT CHECKLIST You don’t prepare for a hurricane after it hits, right? You shouldn’t think about Cyber-Security threats after you’ve been hacked. While there is no way to completely eliminate cyber risk, there are steps every business – from the smallest Main Street shops to the international joint ventures – can take to … More CYBER RISK SELF-ASSESSMENT CHECKLIST

MITIGATION : SOME FINANCIAL SECURITY TIPS

Online financial accounts are vulnerable to security theft now more than ever. Even the best procedures cannot prevent all instances of identity theft—especially if the vulnerability lies with you, the customer. Cyber Security :  “a set of practices, measures and/or actions you can take to protect personal/organizational information and computer from attacks” Post on Insider … More MITIGATION : SOME FINANCIAL SECURITY TIPS

RANSOMWARE AS A SERVICE

RANSOMWARE is a most happening thing in technology this article is focusing on latest variants and attacking vectors and on serious note biggest threat. Src: Twitter  Ransomware is the fastest growing and most lucrative form of malware, cyber criminals can leverage today, leading to an escalating upswing in new Ransomware development each month. Src: F-Secure … More RANSOMWARE AS A SERVICE

SECURITY – G U I D E

Here’s a little guide that I hope can help. The advice here is not intended for ‘activists’ or ‘hacktivists’ or hackers who already know these things, and who have advanced needs and knowledge. It’s for every technical or non-technical one. Lets clear with Security Triad A simple but widely-applicable security model is the CIA triad; … More SECURITY – G U I D E

DATA SECURITY

Data is an important asset for any vertical. It is hard to overstate the importance of data security. The 2016 threat environment for hacking and breaching is quite dangerous. Bad actors overseas in places like Nation/Non-Sponsored Intruders frequently raid companies of all sizes looking for anything they can find, from personal information to commit fraud … More DATA SECURITY