A beginner's guide to various cybersecurity concepts and tools
Note - Only for education purpose
- Tracking
- OSINT
- VirusTotal
- Yara
- Access the DarkWeb via VPN โ Tor
.onion
;- Use
proxychains4
to setup multipleSOCKS5
proxies as Threat Actors could control exit and entry nodes- Add proxies here :
/etc/proxychain4.conf
- Get free proxies from SPYS.ONE that have the least latency but these have to be tested
- Usage :
proxychains4 <application/cmd-line>
- Make sure the service of Tor is running :
sudo service tor start
- Tyres of Chaining available - Dynamic, Strict, Round Robin, Random (Hard for HTTPS)
- Always leave the
proxy_dns
enabled
- Add proxies here :
- More Tor nodes or longer chains provide more security but speed degrades
- Search :
ahmia.fi
- Use firewall like
Pfsense
and make sure only the required ports are open
- Use
- Testing
- OS
- The safest is to run
Tails OS
only on a USB- This erases any downloaded files removing your footprint
- Make sure internet connection is turned off when accessing these downloaded files
Whonix
has a gateway and workstation for access via TorKali Linux
andUbuntu
require manual setting up of Tor
- The safest is to run
-
Command to fetch the domainrole
> wmic computersystem get domainrole
Value DomainRole 0x0 Standalone Workstation 0x1 Member Workstation 0x2 Standalone Server 0x3 Member Server 0x4 Backup Domain Controller 0x5 Primary Domain Controller
YouTube Channels |
---|
David Bombal |
HackerSploit |
John Hammond |
Network Chuck |
Nour's tech talk |
LiveOverflow |
stacksmashing |
The Cyber Mentor |
Reverse Engineering / Malware Analysis |
---|
Dr Josh Stroschein |
DuMp-GuY TrIcKsTeR |
HEXORCIST |
OALabs |
Malfind Labs |
MalwareAnalysisForHedgehogs |
Neil Fox |
The PC Security Channel |