Cybersecurity Tips, Tools, and Techniques

Cybersecurity Tips, Tools, and Techniques

Cybersecurity Tips, Tools and Techniques for Your Professional Tool Bag Ron Woerner, CISSP, CISM Bellevue University @ronw123 10/23/2019 Ron Woerner WhoAmI – Ron Woerner • President / Chief Trusted Advisor • Cybersecurity Instructor, Bellevue University • 25+ years experience in IT / Security • CISSP, CISM • Blogger, podcaster & writer • Given tons’o presentations on security and Internet safety 10/23/2019 Ron Woerner Thoughts are my own Use at your own risk 10/23/2019 Ron Woerner Apologies in advance for broken links Content as of October 2019 10/23/2019 Ron Woerner What the $%$# are we doing here? Tools, applications, Cybersecurity tips to keep websites, references, yourself, others, and other stuff that can help hopefully your company you do you job. out of trouble. 10/23/2019 Ron Woerner First Some Basics 10/23/2019 Ron Woerner If you only remember 1 slide… https://niccs.us-cert.gov/national-cybersecurity-awareness-month-2019 https://staysafeonline.org/ https://www.stopthinkconnect.org/ 10/23/2019 Ron Woerner #1 Overall Tool - Humans “The art and science of skillfully maneuvering humans to take an action that may or may not be in their own best interests.” Chris Hadnagy, Social Engineering, The Science of Human Hacking 10/23/2019 Ron Woerner #1 Technical Hacking Tool https://www.google.com/advanced_search 10/23/2019 Ron Woerner Time Travel Google Cache Archive.org – Wayback Machine 10/23/2019 Ron Woerner Lists of tools, tips, & tricks • SecTools • Peerlyst List of Security Tools • OlderGeeks • HowToGeek.com, Geek School 10/23/2019 Ron Woerner Cheat Sheets • Peerlyst – Complete List of InfoSec Cheat Sheets • Lenny Zeltser – IT and Information Security Cheat Sheets: https://zeltser.com/cheat-sheets/ • Malware Archeology (Auditing) – https://www.malwarearchaeology.com/cheat-sheets/ • OWASP – https://www.owasp.org/index.php/OWASP_Cheat_Sheet_Series 10/23/2019 Ron Woerner Security Checklists / Publications • NIST • CSRC: http://csrc.nist.gov/ • Publications: http://csrc.nist.gov/publications/PubsSPs.html • Center for Internet Security • Controls: https://www.cisecurity.org/controls/ • Benchmarks: https://www.cisecurity.org/cis-benchmarks/ • CIS Controls Self-Assessment Tool, or CIS CSAT • DISA IASE Security Technical Implementation Guides (STIGs) https://iase.disa.mil/stigs/Pages/index.aspx 10/23/2019 Ron Woerner Tools and Technologies 10/23/2019 Ron Woerner Finding Products https://www.capterra.com/ 10/23/2019 Ron Woerner https://attack.mitre.org/ 10/23/2019 Ron Woerner Computing Environments – Creating a Test Lab 10/23/2019 Ron Woerner Personal Labs – Virtual Environments • Oracle VM VirtualBox • VMWare Workstation • Windows 10 – Hyper-V • MacOS Parallels LifeHacker – How to Set Up a Virtual Machine for Free • Linux Distros 10/23/2019 Ron Woerner Linux Distros https://livecdlist.com/ https://distrowatch.com/ 10/23/2019 Ron Woerner Network Mapping Nmap / ZenMap 10/23/2019 Ron Woerner Network Mapping Fing (iOS & Android) 10/23/2019 Ron Woerner Network Enumeration Shodan (https://www.shodan.io/) – Search engine for Internet-connected devices. 10/23/2019 Ron Woerner Network Enumeration Censys (https://www.censys.io/) - Find and analyze every reachable server and device on the Internet. 10/23/2019 Ron Woerner Network Vulnerability Detection https://www.ssllabs.com/ 10/23/2019 Ron Woerner VPNs Commercial Hotspot Shield Algo VPN with DigitalOcean • 1. Create an account on a cloud hosting provider like DigitalOcean • Tunnel Bear 2. Download Algo VPN on your local computer, unzip it 3. Install the dependencies with • Windscribe the command lines on this page 4. Run the installation wizard • Deeper Network 5. Double click on the configuration profiles in the configs directory https://deeper.network/ 10/23/2019 Ron Woerner DNS Servers • Google Public DNS – 8.8.8.8 and 8.8.4.4 • Cloudflare – 1.1.1.1 and 1.0.0.1 • Quad9 – 9.9.9.9 and 149.112.112.112 • OpenDNS (Cisco) – 208.67.222.222 and 208.67.220.220 • Verisign – 64.6.64.6 and 64.6.65.6 10/23/2019 Ron Woerner Windows Administration SysInternals Suite • Autoruns • Process Explorer • Process Monitor Video: Mark Russinovich, Malware Hunting 10/23/2019 Ron Woerner Windows Administration GodMode • Create a new folder and edit it so that it is named the following and then press enter. • GodMode.{ED7BA470-8E54-465E-825C-99712043E01C} • When done, you should have an icon on your desktop 10/23/2019 Ron Woerner Windows Administration PowerShell • Using Windows PowerShell • PowerShell.exe Command-Line Help PowerToys • Windows Key Shortcut Guide • FancyZones https://github.com/microsoft/PowerToys 10/23/2019 Ron Woerner AntiVirus • VirusTotal – https://www.virustotal.com/ • AVG AntiVirus FREE • Avira • Avast • Adaware • Others… See https://www.tomsguide.com/us/best-free-antivirus,review-6003.html Free for personal use (not business) 10/23/2019 Ron Woerner Linux on Windows Windows Subsystem for Linux https://docs.microsoft.com/en- us/windows/wsl/about Run bash.exe HTG Article: https://www.howtogeek.com/270810/how- to-quickly-launch-a-bash-shell-from- windows-10s-file-explorer/ 10/23/2019 Ron Woerner Network Vulnerability Detection • Firewall Audit Tool: https://www.wallparse.com/ • Titania Nipper Studio*: https://www.titania.com/nipper-studio • Solarwinds*: https://www.solarwinds.com/downloads • Firewall Browser • Network Configuration Manager • IP Address Manager *Trial versions 10/23/2019 Ron Woerner Patching & Updating Ninite https://ninite.com/ 10/23/2019 Ron Woerner Patching & Updating SNIPE-IT Chocolatey * https://snipeitapp.com/ https://chocolatey.org/ BatchPatch* https://batchpatch.com/ 10/23/2019 Ron Woerner *Trial versions Network Evaluation / Troubleshooting https://www.wireshark.org/ Introduction video TcpDump 10/23/2019 Ron Woerner Security / Pen Testing Distros • Kali https://www.kali.org/downloads/ • Parrot Security OS https://www.parrotsec.org/download- security.php • Tails https://tails.boum.org/ 10/23/2019 Ron Woerner Pen Testing Framework https://www.metasploit.com/ https://www.offensive-security.com/metasploit-unleashed/requirements/ 10/23/2019 Ron Woerner Social Engineering • IntelTechniques (OSInt) – https://inteltechniques.com/menu.html • Spiderfoot – https://www.spiderfoot.net/ • Maltego – https://www.paterva.com/ • Cree.py – Geolocation Information Aggregator, http://www.geocreepy.com/ • Peek You - www.peekyou.com 10/23/2019 Ron Woerner Social Engineering Toolkit (SET) https://www.trustedsec.com/social10/23/2019 -engineerRon Woerner-toolkit-set/ Security Testing • Person use • Scan up to 16 IPs https://www.tenable.com/products/nessus/nessus-essentials 10/23/2019 Ron Woerner Security Testing http://www.openvas.org/index.html 10/23/2019 Ron Woerner Security Testing • OWASP Zed Attack Proxy (ZAP) • Portswigger Burp Suite* • Vega • Netsparker* • GuardiCore Infection Monkey *Trial versions 10/23/2019 Ron Woerner Digital Forensics • SANS SIFT • The Sleuth Kit (+Autopsy) • Digital Forensics Framework • CAINE (Computer Aided INvestigative Environment) • Access Data FTK 10/23/2019 *TrialRon versions Woerner Personal Security – Password Vaults • LastPass • KeePass • LogMeOnce • 1Password • RoboForm • Dashlane 10/23/2019 Ron Woerner Personal Security – Encryption • 7-Zip • AES Crypt • Veracrypt 10/23/2019 Ron Woerner Business Continuity Planning DHS – Ready.Gov 10/23/2019 Ron Woerner https://www.ready.gov/business-continuity-planning-suite 10/23/2019 Ron Woerner Going for Help • FBI Internet Crimes Complaint Center (IC3): https://www.ic3.gov/default.aspx • The Cybersecurity and Infrastructure Security Agency (CISA) • US-CERT Incident Reporting System: https://www.us- cert.gov/forms/report • State Patrol and Local Police • Your bank Security Careers / Certifications https://www.cyberseek.org/ Heat Map & Career Pathway 10/23/2019 Ron Woerner Security Books https://cybercanon.paloaltonetworks.com/ 10/23/2019 Ron Woerner What Else? Help add to the list 10/23/2019 Ron Woerner “Apply Slide” • Immediate: • Pick 1 or 2 tools / techniques • Play / Try it out / Experiment • Next 4-6 Weeks (rinse and repeat in 3 & 6 mos): • Review this slide deck • Pick more tools (3-5) • Experiment with tools in a virtual environment • Review the awareness websites 10/23/2019 Ron Woerner Cybersecurity Tips, Tools, & Techniques Ron Woerner, CISSP, CISM ron.woerner @ rwxsecurity.com Twitter: @ronw123 10/23/2019 Ron Woerner.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    53 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us