/Cybersecurity-Guide

when we know in what ways a hacker can exploit our systems we can figureout ways to protect our systems.

Cybersecurity-Guide

In last few years I had the oppurtunity to learn about cybersecurity, and what I have realised is that one of the most effective way to protect ourself from hackers is to be aware of cybersecurity, when we know in what ways a hacker can exploit our systems we can figureout ways to protect our systems. So in this repository I will me compiling all common ways a hacker can attack on a system and way to protect us from those attacks. You will be suprised to know how scary easy it is to hack a system, even some amature kid without core knowledge of IT can easily hack, just by using free tools.

Legal disclaimer:

The resources provided in this repository is for purely educational purpose. Do not hack into any system without owner's permission. Developer(s) assume no liability and are not responsible for any misuse or damage caused by this resource. It's the end user's responsibility to obey all applicable local, state and federal laws.

i. Hardware hacking devices

1.Rubber ducky or Bad USB

rubber ducky Usually most of us don't think twice before connecting a USB device (like a USB flash drive or a power bank) to our systems, as we are very much used to these devices and that what makes rubber ducky so dangerous. It is a USB device that could minic a HID or Human Interface Device like a keyboard, exploiting the system's trust on it's users.
Being able to minic a keybord it could type all kinds of commands.
Rubber Ducky is made and sold by Hak5 (https://shop.hak5.org/products/usb-rubber-ducky-deluxe).
Rubber Duckies are used in one of two ways:

  • Leave it near target, hopping trget might plug it in, out of curiosity
  • If the target leaves the system unlocked for some time the attacker plug it in

The attacker needs to set up the payload before the attack. Which can be easily downloaded from github (https://github.com/hak5darren/USB-Rubber-Ducky/wiki/Payloads).
The avalable payloads include:
  • Pranks like rickroll
  • revese shell attacks (in simple words getting remote access of target machine from internet)
  • password stealler

Attcker can eaily create their own scripts also.As you can imagine the possibilities are endless, afterall you can mimic to be a user's keyboard.

DIY Rubber ducky

Now rubber ducky is a bit expensive($50) and it may not be available in many countries also there is a risk of loosing it after attacking, so you might think it's quite unlikely that someone will hack an ordinary user with a rubber ducky, well it can esily made using affordable microcontrollers like Raspberry pi pico & Digispark Attiny85.
To know more check out the following videos. pico ducky rubber ducky

How to protect yourself

  • Never trust any USB device like flash drive, powerbanks or even USB cables
  • Always lock your system (windows key + l)
  • Always check if any foreign USB device is connected to your system or not
  • Enable password authentication for admistrative access (https://youtu.be/e_f9p-_JWZw?t=1056)

i. Software hacking tools

Setting up our hacking lab:

Now while working with hacking tools we want to work in an environment that's safe and anonymous, for this we will use a virtual machine running linux OS like Kali linux or Parrot OS


1.Acessing Web Camera with a link:

The avalable payloads include:


2.Acessing Location with a link:


The avalable payloads include:

How to protect yourself

  • Go to browser settings
  • Go to "Security and Privacy"
  • Go to "site settings"
  • Revoke unnecessary permission
  • Do not click on unknown links

3. Fake Login Screen to capture windows password

The avalable payloads include: