Cyber Offenses & Defenses
Thursday, April 7, 2022
Cybersecurity Future Jobs:
Thursday, September 5, 2019
Cyber Hunting Technics
Hunting: Is something where the unnoticed threat might be lying in an intranet. As a persona like threat hunter should apply his logicality technics to capture a threat or vulnerability. Hence, we identified prior exploiter or stopping future attacks.
Hunter Tools: He/She would apply his/her logics to unearth bots/vulnerabilities. Thus, they need external intel too.
Here logic is: If a person applying his thoughts definitely takes time to dig out the bot. But, if they were taking help from other external intel inputs as well. It is much lesser time to Identify.
Universal Declaration of Human Rights
The initial state of this HTTP Server will be set :80/0 to :80/9 a total of 10 URIs, correspondingly, the Universal Declaration of Human Rights in 8 languages and 2 empty contents are displayed. For example, the :80/0 returns the Chinese version of the “Universal Declaration of Human Rights” .
This article focuses on the UDP service component of HEH Botnet. This component has two key functions: UDP service port number generation and command parsing .
Communication module-Telnet service brute force cracking
After the Bot runs the P2P module, it will execute the brute force task against the Telnet service for the two ports 23 and 2323 in a parallel manner, and then complete its own propagation.
In other words, if the Telnet service is opened on port 23 or 2323, it attempts a brute-force attack using a password dictionary consisting of 171 usernames and 504 passwords. On a successful break-in, the newly infected victim is added to the botnet, thereby amplifying it
4c345fdea97a71ac235f2fa9ddb19f05
66786509c16e3285c5e9632ab9019bc7
6be1590ac9e87dd7fe19257213a2db32
6c815da9af17bfa552beb8e25749f313
984fd7ffb7d9f20246e580e15fd93ec7
bd07315639da232e6bb4f796231def8a
c1b2a59f1f1592d9713aa9840c34cade
c2c26a7b2a5412c9545a46e1b9b37b0e
43de9c5fbab4cd59b3eab07a81ea8715Thursday, May 25, 2017
Cyber-Combat
DDoS Attack on DNS Provider disrupts Okta, Twitter, Pinterest, Reddit, CNN, Others
Brief but Widespread attack illuminated vulnerabilit of the internets (Domain Name Syster)DNS infrastructure. A major distributed Denial of Service (DDoS) attack on Internet Domain Service provider Dyne in the early morning hours on the East Coast today disrupted major websites -including okta, cnn and provided a grim reminder of the vulnerability of a key element of the internet's infrastructure.
Sinkhole Attack on Wireless Sensors Network(WSN):Sinkhole attack is a type of attack were compromised node tries to attract network traffic by advertise its fake routing update. One of the impacts of sinkhole attack is that, it can be used to launch other attacks like selective forwarding attack, acknowledge spoofing attack and drops or altered routing information.
Attack on Mint Routing Protocol. A data node has called neibhor. A compromised node metrix hope count is always low. Ask other nodes to let go through the traffic I Am idle.
MintRoute protocol is a type of protocol which is commonly used in wireless sensor network. It was designed purposly for the wireless sensor network. It is light and suitable for sensor nodes which have minimum storage capacity, low computation power and limited power supply. MintpRoute Protocol uses link quality as a metric to choose the best route to send packet to the Base Station.
Insider attack and outsider attack are two categories of attack in wireless sensor network. Outside attack is when intruder is not part of network. In inside attack the intruder compromised one of the legitimate node through node temperating or through weakness in its system software then compromised node inject false information in network after listen to secret information. Inside attack can disrupt the network by modifying routing packet. Through compromised node sinkhole attack attract nearly all the traffic from particular area after making that compromised node attractive to other nodes.
The fact is that compromised node possesses adequate access privilege in the network and has acknowledge pertaining to valuable information about the network topology this created challenges in detecting. Base to that situation even cryptographic cannot defend against insider attack although it provides integrity, confidentiality and authentation. Therefore the internal attack has more serious impact on victim system compared to outsider attack.
https://arxiv.org/ftp/arxiv/papers/1505/1505.01941.pdf
IntSight Isreal: It is a cyber security awarens news and actions moreever focused on Incident Investigation rather than Incident Research. As per wikileaks CIA hacking tool is Vault7