Categories
Cyber Security Lists

Basic Security Practices

Create a DR/BCP Plan and test it annually, including a test of your backups/restore

Create a scheduled access and privileged audit of all your critical systems every 3 or 6 months, so making sure all leavers are disabled and there are no extra admins etc

Have a solid asset database for physical assets and who owns them, serial number etc Asset list for servers including how they are backed up, physical/vm, what they are used for, services they run, are they critical etc

Digital asset list for all of the software programs that your users use, including who has admin, the type of data that they hold, if it is critical to the business etc

Make sure your user base takes cyber awareness training

Create a daily checklist of things to be checked like admin logs, alerts, emerging threats, backups, and create an escalation process. Audit to make sure it is getting done regularly.

Create a change management system

Setup a base policy set like acceptable use, BYOD, Password policy, Information Technology policy (goes over guidelines for your IT team), remote work, physical security, clear desk policy, employee handbook etc

Document physical security at your location/s for deliveries, guests, cameras, card pass logging etc

Document and check your onboarding and offboarding processes Work with HR to make sure all employees get a contract, are background checked, get trained and get a handbook etc

Get a copy of all client contracts and make sure you are compliant

Create a checklist and/or questionnaire for security reviews of vendors and new tech

Create an objectives and measures for your IT organization with 8 or so KPIs like vulnerabilities remediated in X amount of time, users with x% of phishing messages, Help Desk responding in X amount of time etc. Then measure it regularly and have a meeting with management to review every 6 months

Get a solid vulnerability remediation and management plan in place

MFA EVERYWHERE

Local Admin NOWHERE

Disk encryption EVERYWHERE

Phishing tests for all employees

Work out how to protect corporate email on BYOD phones

Talk to senior management about risk and document where they find the biggest risks to the business. Take steps to mitigate and track progress regularly

Create a “continual improvement log” that tracks security items you run across or think of and track them to remediation

Run incident response exercises with your team, so pretending something happened and see how they react etc.

Inventory all your critical business assets in a spreadsheet (i.e., what makes the money come in)

Identify what data you rely on to do business, tag them to specific systems in this spreadsheet

Work to get backups of the critical data and systems, ideally somewhere that isn’t directly networked (read: accessible to ransomware or bad actors)

Implement MFA on all remote access (email, VPN, server administration, whatever)

Make sure everyone is using passwords (kinda default with the “MFA” suggestion)

Get endpoint protection in place; anything is better than nothing, but any of the best ones are a little pricy but definitely worth it because, as a small business, your users will destroy you.

Try and get a vulnerability scan (free ones exist) and use your existing free-hand knowledge to scan ports and services to identify potential openings/risks.

Sources:

  • https://www.reddit.com/r/sysadmin/comments/13bl1iu/comment/jjcutf3/?utm_source=share&utm_medium=web3x&utm_name=web3xcss&utm_term=1&utm_content=share_button
  • https://www.reddit.com/r/cybersecurity/comments/138iy0c/comment/jiz14fj/?utm_source=share&utm_medium=web3x&utm_name=web3xcss&utm_term=1&utm_content=share_button
Categories
Cyber Security

USB Data Blockers (A.K.A. “USB Condoms”)

This post may contain affiliate links and I may earn a small commission if you make purchases using links on this page at no additional cost to you. I only endorse products that I love and/or use myself.

USB Data Blockers are a must if you regularly charge your phone using a public USB charging port.

USB charging stations can be modified to contain malicious hardware that can be used to hack into your phone when you plug into it. This type of attack is known as “Juice Jacking”. USB Data Blockers prevent any kind of data transfer from occurring while allowing the device to charge, preventing this kind of attack.

Here are some recommended USB data blockers that you can use to protect your device while away from home.

This 4-pack includes both regular USB-A and USB-A to USB-C data blockers. Made of Aluminum, these ones should be more durable than plastic data blockers.

If you find yourself using USB-C charging ports, you’ll want to grab this version instead.

Here’s another solid option for a regular USB-A datablocker that has a high rating and great reviews.
Categories
Cyber Security Lists

Recommended Privacy VPNs

Picture of a laptop secured with a VPN

When away from home, it’s especially important to use a privacy VPN when connecting to WiFi. Most privacy VPN services only cost a few dollars a month, are easy to use on your laptop or smartphone, and provide a reasonable level of security when connecting to unknown WiFi networks. Here are a few VPN services that I recommend.

Recommended VPNs:

Keep reading for a description of each of these services.

NordVPN

NordVPN is one of the biggest names in the world of privacy VPNs. They’re a trustworthy company and have an easy-to-use app for both desktop and mobile devices. I’ve been using them for several years, and they are my VPN provider of choice. Their subscription is very affordable at just a few dollars a month. You can get a discounted rate using this link.

Surfshark

In addition to being extremely affordable, Surfshark also lets you use your account on an unlimited number of devices, whereas most providers limit you to 5-10 devices per account. They have multiple subscription lengths available, including monthly and annual options. You can use this link to get a discount.

Proton VPN

Proton VPN, owned by Proton (also known for their Proton Mail email service) is a very security-conscious company that offers private email service in addition to their privacy VPN. They are definitely a company that I would trust, and I recommend their services. You can check out their VPN options here.

ExpressVPN

ExpressVPN is another well-known privacy VPN provider. They consistently receive high customer satisfaction ratings and are a reputable option. You can check out their services here.

Additional VPN options

If for some reason you don’t like any of the above options, there are alternatives available. Here’s a list of some of the other options I’m aware of.

Categories
Cyber Security Lists

Recommended Password Managers

With the ever increasing volume of data breaches, having unique, secure passwords is more important than ever. Here you’ll find my list of recommended password managers that you can use to securely store your passwords.

Recommended Password Managers:

  • KeePass (free, offline, no cloud sync)
  • LastPass (no longer recommended, too many data breaches)
Categories
Cyber Security

Cyber Attack Maps (a.k.a. “Pew-Pew” maps)

Here’s a list of Pew-Pew maps for your enjoyment.

Arbor Networks: https://www.digitalattackmap.com

Bitdefender: https://threatmap.bitdefender.com

Checkpoint: https://threatmap.checkpoint.com

FireEye: https://www.fireeye.com/cyber-map/threat-map.html

Fortinet: https://threatmap.fortiguard.com

Imperva: https://www.imperva.com/cyber-threat-attack-map

Kaspersky: https://cybermap.kaspersky.com

Netscout: https://www.netscout.com/ddos-attack-map

Radware: https://livethreatmap.radware.com

Spamhaus: https://www.spamhaus.com/threat-map

Thales Group: https://cyberthreat.thalesgroup.com

Categories
Cyber Security Lists

List of NDR Tools

VendorProduct
Arista NetworksArista NDR
CiscoSecure Network AnalyticsSecure Cloud Analytics
CorelightCorelight Open NDR Platform
DarktraceDarktrace DETECT; Darktrace RESPOND
ExtraHopReveal(x)
Fidelis CybersecurityFidelis Network
GatewatcherAionIQ
GigamonGigamon ThreatINSIGHT
IronNetIronNet Collective Defense Platform
PlixerPlixer Security Intelligence Platform
ProgressFlowmon Anomaly Detection System
QI-ANXINSkyEye
SangforCyber Command
Stamus NetworksStamus Security Platform
TencentT-Sec NDR
TrellixTrellix Network Detection and Response
Trend MicroTrend Micro Deep Discovery; Trend Micro TippingPoint; Trend Micro Vision One
VectraVectra Threat Detection and Response Platform
VMwareNSX Network Detection and Response

Accedian
Allentis
aizoOn (Aramis)
Blue Hexagon (Acquired by Qualys Oct 2022)
BluVector
CloudCover
cPacket Networks
Cryptomage
CUSTOCY
CyGlass
Cynamics
Deep Instinct
Exeon
Fortinet
GREYCORTEX
Hillstone Networks
Huawei
LiveAction
LogRhythm
Lumu Technologies
MixMode
Muninn
NANO Corp
Netography
NetWitness
NextRay
Nominet
OpenText (Bricata)
Ordr
Quad Miners
Qihoo 360
Sesame IT
Stellar Cyber
TEHTRIS
ThreatBook
ThreatWarrior
Tophant
Vehere
Venustech
Verizon

Categories
Cyber Security

How Secure Is My Smart Device?

When it comes to smart device security, generally speaking, a smart device will be slightly less secure than the cloud account and WiFi network that it is connected to.

Why” slightly less secure? “

There are two main ways that a smart device could be compromised: Remotely from anywhere in the world using the connected cloud account, and by someone who has hacked into your WiFi network.

The connected cloud account is the most widely accessible attack vector as it can be accessed from anywhere in the world. A compromised cloud account will give an attacker access to your devices without having to actually “hack” the device itself.

Conversely, if you have a nefarious neighbor who is able to guess the password to your WiFi network, they will be able to access your device directly and attempt to log in locally or exploit security vulnerabilities on the device itself.

A cloud account with a strong, unique password and MFA enabled, combined with a strong WiFi password, are your first lines of defense and will considerably improve the security posture of your smart home devices. (Click here for a list of password managers that I recommend.)

However, each smart device may have additional “features” or security flaws which add additional security risks even with a secure cloud account and WiFi network – hence “slightly less secure.”

For example, some devices use a technology called UPnP, or “Universal Plug-n-Play” to expose themselves directly to the internet. UPnP is enabled by default on most home routers and makes setup easier for some devices. However, it introduces additional security risks as well. Disabling the UPnP feature on your router is a great way to further improve the security of your smart devices.

Categories
Cyber Security

Deciphering Windows Event Logs: 4733

4733: A member was removed from a security-enabled local group

This event can be interpreted as:

"<subjectUserName> removed <memberSid> from group <targetUserName>. This action was performed from <computer>."

Helpful Hints:

To get the username of an account by SID, you can use the following command (note: this works well for local accounts, there may be a better way to do this in AD):

wmic useraccount where sid="S-1-5-21-3696241878-1170446952-3831691710-1002" get name 
Name 
SuperHacker

Categories
Cyber Security

Deciphering Windows Event Logs: 4732

4732: A member was added to a security-enabled local group

This event can be interpreted as:

"<subjectUserName> added <memberSid> to group <targetUserName>. This action was performed from <computer>."

Helpful Hints:

To get the username of an account by SID, you can use the following command (note: this works well for local accounts, there may be a better way to do this in AD):

wmic useraccount where sid="S-1-5-21-3696241878-1170446952-3831691710-1002" get name 
Name 
SuperHacker
Categories
Cyber Security

Decrypting WPA2 Encrypted Wi-Fi Traffic with Wireshark

TL;DR

sudo ip link set wlan1 down
sudo iw dev wlan1 set type monitor
sudo ip link set wlan1 up
sudo iw dev wlan1 set channel 6
sudo tcpdump -i wlan1 -w %Y-%m-%d_%H.%M.%S.pcap -G 3600
  1. Capture some handshakes
  2. Open .pcap file in Wireshark
  3. Edit > Preferences > Protocols > IEEE 802.11 > Decryption Keys > Edit > New (+)
  4. Select key type: wpa-pwd
  5. Enter the key in the following format: password:ssid
  6. Click OK, then OK again. Wireshark will refresh the display with decrypted traffic. Set the display filter to “ip” to filter out all of the wireless noise.

Intro

Analyzing WPA2 encrypted wireless traffic is more difficult than I thought it would be. After several hours of struggling, I was able to do it. Here’s a condensed version of what I learned.

There are several components that must all work together in order to be successful:

  1. You must have the WPA2 password and SSID
  2. You can only unencrypt traffic for devices for which you also captured a four-way handshake which occurred after the handshake took place
    1. Cool side note: This might even work across pcaps if the files are opened in the right order! For example, if you capture a handshake in cap1.pcap, and more traffic (but no handshake) in cap2.pcap, you can open cap1.pcap first, then File > Open cap2.pcap, and the handshake from cap1.pcap will be used to decrypt traffic in cap2.pcap.

Note: In theory, this should work with WPA and WEP encrypted traffic as well, with only slight modification for WEP.

1. Capturing Traffic in Linux

First, let’s capture some traffic (note, you may need to change “wlan1” to “wlan0” or whatever your adapter shows up as. To see a list of all wireless adapters, run “iwconfig”.) You’ll need to know which channel the desired AP is running on.

To discover this on 2.4Ghz networks, use

sudo airodump-ng wlan1

Or for 5Ghz networks, use

sudo airodump-ng -b a wlan1

(Note: not all traffic may be captured on 5Ghz with this method; I’m still working on this.)

(Note 2: If you’re doing this in Kali Linux, be sure to update your distro before proceeding or airodump-ng will likely fail:)

sudo apt update
sudo apt upgrade

Once you know which channel you need to use, run the following commands:

sudo ip link set wlan1 down
sudo iw dev wlan1 set type monitor
sudo ip link set wlan1 up
sudo iw dev wlan1 set channel 6 # (set the correct channel here)
sudo tcpdump -i wlan1 -w %Y-%m-%d_%H.%M.%S.pcap -G 3600

That last command will begin capturing traffic to a file with a filename of the current timestamp and will start a new .pcap file every 3600 seconds (1 hour). Capture as much traffic as you desire, and then press CTRL+C to stop the packet capture.

2. Capturing a Handshake

Be sure to capture a handshake for the device you wish to decrypt traffic for; the handshake will be required to decrypt the traffic for that device. If you can’t manually disconnect and reconnect a device, you can attempt to de-authenticate the device (or all devices) from the network in hopes that they will then reconnect.

To deauth a device, you’ll need to know the BSSID of your AP. To find the BSSID, run:

sudo airodump-ng wlan1

Once your AP has appeared, press CTRL+C to cancel.

Now, you can use the BSSID to deauth a device. To deauth a single device, run:

sudo aireplay-ng --deauth 2 -a [bssid] -c [mac address of device] wlan1

Or, to deauth ALL devices (you should probably be careful with this option), run:

sudo aireplay-ng -0 2 -a [bssid] wlan1

Now that you’ve caught some handshakes, we can start decrypting traffic. NOTE: Only traffic that was captured after the handshake can be decrypted.

3. Decrypting and Analyzing Traffic in Wireshark

To view the decrypted traffic in Wireshark:

  1. Open the pcap file in Wireshark
  2. Go to: Edit > Preferences > Protocols > IEEE 802.11 > Decryption Keys > Edit > New (+)
  3. Select key type: wpa-pwd
  4. Enter the key in the following format: password:ssid
  5. Click OK, then OK again. Wireshark will refresh the display with decrypted traffic. Set the display filter to “ip” to filter out all of the wireless noise.