cissp
16.5K subscribers
955 photos
66 videos
1.73K files
4.8K links
@cissp
International channel 4 Transmission Knowledge In the Field of Cyber Security with a Focus on the Content of the CISSP-ISC2 Course
- - - - - - - - - -
+also group: https://t.me/cisspgroup
—————————
@alirezaghahrood
Download Telegram
cissp
Photo
1. with vehicle number plates.
more argument: @cisspgroup
Learn more about "Breach Detection Gap" or "Dwell time"

Two useful links

1.Dwell Time: A Cybersecurity Metric https://www.armor.com/blog/dwell-time-cyber-security-metric/

2. “Breach Detection | Controlling Dwell Time Is About Much More Than Compliance” by Robert MacMillan https://link.medium.com/KsSTdxcvlZ
Vulnerability Assesment ,Management- tools:

OpenVAS, maintained by Greenbone Networks

Nexpose or InsightVM (cloud-based), from Rapid7👌🏽👌🏽

Retina CS Community, from BeyondTrust

Burp Suite Community Edition, from PortSwigger

Nikto, sponsored by Netsparker

OWASP Zed Attack Proxy (ZAP)
Beyond open source

Acunetix

beSecure (AVDS)👌🏽👌🏽

Comodo HackerProof

Intruder

Netsparker👌🏽👌🏽

Tenable Nessus Professional👌🏽👌🏽

Tripwire 360👌🏽👌🏽

And
5 Step
For VA!

1.Planning
You need to start by determining which systems and networks will be assessed (including mobile and cloud), identifying where any sensitive data resides

2.Scanning
Next, actively scan the system or network, either manually or via automated tools, and use threat intelligence and vulnerability databases to identify security flaws and weaknesses and filter out false positives. Particularly with a first assessment

3.Analysis
A more detailed analysis then follows, providing a clear sense of the causes of the vulnerabilities, their potential impact, and the suggested methods of remediation. Each vulnerability is then ranked or rated based on the data at risk, the severity of the flaw, and the damage that could be caused by a breach of the affected system.

4.Remediation
Finally, the vulnerability assessment results in an effort to patch key flaws, whether simply via a product update or through something more involved, from the installation of new security tools to an enhancement of security procedures.

5.Repeat
Vulnerability assessments need to be conducted on a regularly scheduled basis, quarterly at least (ideally monthly or weekly), as any single assessment is only a snapshot of that moment in time. Having those snapshots or reports to refer to over a period of time will also give you a strong sense of how your security posture has developed, for better or for worse.
De best framework 4 hacking:

- infectador infecta apks
https://lnkd.in/fp_FTir

- dref
- DNS Rebinding Exploitation Framework
https://lnkd.in/fgu3DEm

- /routersploit
- The Router Exploitation Framework
https://lnkd.in/fZmKhky

- Eazy
- best framework for information gathering ,pentesting and web aplication scanner
https://lnkd.in/ftH2m_5

- BoomER
- Framework for exploiting local vulnerabilities
https://lnkd.in/fNWGHd7

- TIDoS Framework
- The Offensive Manual Web Application Penetration Testing Framework
https://lnkd.in/f4gSXMQ

- Sn1per
- Automated pentest framework for offensive security experts
https://lnkd.in/fnMVWam

- BeeF-Over-Wan
- Browser Exploitation Framework
https://lnkd.in/fY9YU8U

- DevAudit
- Open-source, cross-platform, multi-purpose security auditing tool
https://lnkd.in/fA7H84k
R:V*T
Risk= Vulnerability * Theat

4 Example:

Threats
• Access to the network by unauthorized persons
• Bomb attack
• Bomb threat
• Breach of contractual relations
• Breach of legislation
• Compromising confidential information
• Concealing user identity
• Damage caused by a third party
• Damages resulting from penetration testing
• Destruction of records
• Disaster (human caused)
• Disaster (natural)
• Disclosure of information
• Disclosure of passwords
• Eavesdropping
• Embezzlement
• Errors in maintenance
• Failure of communication links
• Falsification of records
• Fire
• Flood
• Fraud
• Industrial espionage
• Information leakage
• Interruption of business processes
• Loss of electricity
• Loss of support services
• Malfunction of equipment
• Malicious code
• Misuse of information systems
• Misuse of audit tools
• Pollution
• Social engineering
• Software errors
• Strike
• Terrorist attacks
• Theft
• Thunderstroke
• Unintentional change of data in an information system
• Unauthorized access to the information system
• Unauthorized changes of records
• Unauthorized installation of software
• Unauthorized physical access
• Unauthorized use of copyright material
• Unauthorized use of software
• User error
• Vandalism

Vulnerabilities
• Complicated user interface
• Default passwords not changed
• Disposal of storage media without deleting data
• Equipment sensitivity to changes in voltage
• Equipment sensitivity to moisture and contaminants
• Equipment sensitivity to temperature
• Inadequate cabling security
• Inadequate capacity management
• Inadequate change management
• Inadequate classification of information
• Inadequate control of physical access
• Inadequate maintenance
• Inadequate network management
• Inadequate or irregular backup
• Inadequate password management
• Inadequate physical protection
• Inadequate protection of cryptographic keys
• Inadequate replacement of older equipment
• Inadequate security awareness
• Inadequate segregation of duties
• Inadequate segregation of operational and testing facilities
• Inadequate supervision of employees
• Inadequate supervision of vendors
• Inadequate training of employees
• Incomplete specification for software development
• Insufficient software testing
• Lack of access control policy
• Lack of clean desk and clear screen policy
• Lack of control over the input and output data
• Lack of internal documentation
• Lack of or poor implementation of internal audit
• Lack of policy for the use of cryptography
• Lack of procedure for removing access rights upon termination of employment
• Lack of protection for mobile equipment
• Lack of redundancy
• Lack of systems for identification and authentication
• Lack of validation of the processed data
• Location vulnerable to flooding
• Poor selection of test data
• Single copy
• Too much power in one person
• Uncontrolled copying of data
• Uncontrolled download from the Internet
• Uncontrolled use of information systems
• Undocumented software
• Unmotivated employees
• Unprotected public network connections
• User rights are not reviewed regularly
Forwarded from Information Security Books (CONST@NTINE)
584 Pages | 2019
Forwarded from Information Security Books (CONST@NTINE)
Sybex_CEH_v10_Certified_Ethical.pdf
9.6 MB
Pre Assessment 4
CISSP :