How Denmarkโs Welfare State Became a Surveillance Nightmare ๐ธ๐ฝ๏ธ๐น
The Cyber Threat Against Denmark ๐งโ๐ป
๐ธ๐ธ Forsikringsselskaber har undervurderet cybertruslen: Ransomware fรฅr priserne til at stige ๐ธ๐ธ
๐ฅ๐ถ๏ธDansk hostingselskab lagt ned af ransomware: Kunder har mistet al data ๐ถ๏ธ๐ฅ
๐ Security & Safety ๐
SECURITY & SAFETY, SECURITY & SAFETY, SECURITY & SAFETY, SECURITY & SAFETY, SECURITY & SAFETY, SECURITY & SAFETY, SECURITY & SAFETY, SECURITY & SAFETY, SECURITY & SAFETY, SECURITY & SAFETY, SECURITY & SAFETY, SECURITY & SAFETY, SECURITY & SAFETY, SECURITY & SAFETY, SECURITY & SAFETY, SECURITY & SAFETY
Download WireShark! ๐๐ฆ
Download PyCharm: Python IDE ๐
Download Swiss Army knife for developers (DevToys) ๐ ๏ธ
๐ฝ๏ธ๐ด๐ช CyberChef ๐งโ๐ณ๐ฉโ๐ณ๐จโ๐ณ
๐ ๏ธ๐๐ Risk Assessment Tools: Oregon State University ๐๐๐ ๏ธ
Download PuTTY ๐ฅ๏ธโก๐ฅ๏ธ
๐ป๐๐ป WinSCP ๐ป๐๐ป
๐ netdiscover ๐
๐ Get AccessChk ๐
๐คฌ๐ ๐ก๐ก Download Angry IP Scanner ๐ก๐ก๐ ๐คฌ
๐๐ก Advanced IP Scanner ๐ก๐
Autopsy - Digital Forensics ๐๐โ๐ฆบ
Volatility 3๏ธโฃ
eโterro FTK Imager
โก Zed Attack Proxy (ZAP) โก
As an novice whitehat hacker, there are several tasks you can perform using the Command Prompt (CMD) to enhance your cybersecurity knowledge and protect systems. It's important to note that whitehat hacking is focused on ethical and legal practices, ensuring the security and integrity of systems. Here are a few tasks you can explore:
-
Network Diagnostics: Use CMD commands like
ipconfig
,ping
, andtracert
to diagnose network issues, test connectivity, and troubleshoot network problems. -
Security Auditing: Perform basic security audits using commands such as
netstat
to identify open ports,tasklist
to list running processes, andsysteminfo
to gather system information for vulnerability assessment. -
Password Auditing: Utilize tools like
net user
command to manage user accounts,wmic
to retrieve password policy information, andsecedit
to analyze security policies for password auditing purposes. -
Malware Analysis: Employ CMD tools like
dir
,attrib
, andtasklist
to investigate suspicious files, folders, and processes. Use tools such assfc
(System File Checker) to verify the integrity of system files. -
Log Analysis: Analyze event logs using
eventvwr
to identify potential security incidents, system errors, or anomalies. -
Scripting and Automation: Learn to write simple batch scripts (.bat files) using CMD commands for automating tasks, such as backups, system monitoring, or routine maintenance.
-
System Administration: Familiarize yourself with CMD commands for user management (
net user
), file and folder operations (cd
,copy
,move
, etc.), and system configuration (regedit
,gpedit.msc
) to better understand system administration tasks.
It's important to note that while using CMD commands, always ensure you have proper authorization and adhere to legal and ethical guidelines. Continuous learning, research, and staying updated with cybersecurity best practices will help you advance your skills and responsibly contribute to maintaining system security.
REM To set up the remote computer to allow remote command executions
reg add HKLM\Software\Microsoft\windows\CurrentVersion\Policies\system /v LocalAccountTokenFilterPolicy /t REG_DWORD /d 1 /f
:: Revert Changes
reg add HKLM\Software\Microsoft\windows\CurrentVersion\Policies\system /v LocalAccountTokenFilterPolicy /t REG_DWORD /d 0 /f
%[:%
This command is used to list all the wireless network profiles that have been stored on your Windows computer.
When you run this command, it will display a list of all the Wi-Fi networks that your computer has connected to or tried to connect to in the past.
These profiles can include both secured and open networks.
%:]%
netsh wlan show profiles
%:]%
This command is more specific and is used to display detailed information about a particular wireless network profile, including its security key.
You need to replace "Name" with the name of the network you want to retrieve information about.
When you run this command, it will provide you with the security key (password) of that particular Wi-Fi network, assuming you have the necessary permissions.
%:]%
netsh wlan show profile name="Name" key=clear
Display filters ๐บ
arp.opcode == 2
eth.dst && !(eth.dst[1:2] == eth.dst[3:4] && eth.dst[1:2] == eth.dst[5:6])
// TLS Client Hello
tls.handshake.type == 1
// TLS Server Hello
tls.handshake.type == 2
Basic tshark in action ๐ก๐ฆ
:: Using the wi-fi for 10 seconds, write it into the file "tshark.pcap"
C:\Program Files\WireShark>tshark -i "wi-fi" -a duration:10 -w tshark.pcap
:: Using the wi-fi for 10 seconds, capture filter is DNS write it into the file "dns.pcap"
C:\Program Files\WireShark>tshark -i "wi-fi" -f "src port 53" -a duration:15 -w dns.pcap
The Common Vulnerabilities and Exposures (CVE) Database ๐๐ก
๐งโ๐ป MITRE ATT&CKยฎ ๐ฉโ๐ป
Leet Translator & Generator 1๏ธโฃ3๏ธโฃ3๏ธโฃ7๏ธโฃ
๐ Text to ASCII Art Generator (TAAG) ๐
PacketLife.net ๐๐ฆ๐งฌ๐
MALWARE-TRAFFIC-ANALYSIS.NET ๐ฆ๐๐โ
Speedguide.net - Port 4๏ธโฃ4๏ธโฃ4๏ธโฃ4๏ธโฃ Details
Old School MS-DOS Viruses in Action (15 gifs) ๐ฆ ๐
Cain and Abel (software)
Sample Captures ๐ป๐ก๐บ
How to Get Email Headers ๐ง๐คฏ
Domain-based Message Authentication, Reporting & Conformance - What is DMARC?
The Anti Hacker Alliance (AHA) ๐จโ๐ป
Digital Attack MapTop daily DDoS attacks worldwide ๐
๐ Blocked Internet Ports List ๐
"Bad" TCP/UDP Ports List
List of the Top 1๏ธโฃ0๏ธโฃ0๏ธโฃ0๏ธโฃ Ports
VirusTotal - Analyse suspicious files ๐๐ค
CYBERTHREAT REAL-TIME MAP ๐
Bug Hunter University ๐๐น๐ซ
๐ง๐ฆ๐ง๐ต๐ True People Search ๐ฉ๐จ๐ง๐ด๐ง
RAMMap v1.61
Fone Finder ๐ฑ๐ด๐ฒ๐ถ๐คณ๐ค๐
DistroWatch.com ๐๏ธ๐ฅ๏ธ๐๏ธ
๐๐ฆ VirusTotal ๐ฆ ๐
๐ ';--have i been pwned? ๐
๐งป๐ IT Governance ISO 27001 & ISO 27002 ๐๐งป
๐ Let's Encrypt
๐๐ถ Aircrack-ng Newbie Guide for Linux ๐ด๐ก
The nano GNU - Text Editor Homepage ๐งโ๐ป
CVE Details ๐
Exploit Database ๐ผ
Common Vulnerabilities and Exposures ๐
WiGLE - All the networks. Found by Everyone ๐ก
OPNsenseโs Documentation
Berkeley Database Hardening Best Practices ๐
OSI Layer Attacks
Layer | Attack | |
---|---|---|
7 | Application | Buffer overflow, XSS, DDoS |
6 | Presentation | Unicode vulnerability, SSL strip |
5 | Session | Session hijacking, DNS poisoning |
4 | Transport | SYN flood, invalid TCP flags, UDP flood |
3 | Network | ICMP flood, OS fingerprinting, IP address spoofing, routing table poisoning |
2 | Data Link | Sniffing, ARP cache poisoning, macof attack |
1 | Physical | Cutting cables, jamming, keystroke logging |
News ๐๐ฐ๐๏ธ
SECURITYWEEK NETWORK ๐งโ๐ป
VERSION2๏ธโฃ
2๏ธโฃ4๏ธโฃTech.dk
๐ฅ๏ธDansk IT Sikkerhed ๐ฅ๏ธ
๐ OSINTer - Todays News ๐
Best 160 Cybersecurity Groups On LinkedIn
Join CodeWars with me! ๐จโ๐ป