Digital Pakistan Cybersecurity Hands-On Training - Day 2
Digital Pakistan Cybersecurity Hands-On Training - Day 2
Introduction
Kali Linux & Built in tools
Web Applications (Architecture, Common Vulnerabilities & Attack Types)
Web Security
OSINT Tools
Mobile Attack Vectors & Mobile Security
Operating Systems
An operating system is system software that manages computer hardware and
software resources, and provides common services for computer programs.
Types of Operating Systems
There are approx. 150 Known Operating Systems being used for different
purposes at the moment. Few Examples are:
Open Source Unix Based OS such as DNIX, Free BSD, Linux, Open BSD, Solaris etc.
Proprietary OS such as:
Introduction
Fire OS - Developed by Amazon
macOS, Apple DOS & iOS – Developed by Apple
Chromium OS & Android – Developed by Google
Harmony OS & Lite OS – Developed by Huawei
AIX & TPF – Developed by IBM
Xenix, MS DOS & Windows OS – Developed by Microsoft
Play Station System Software – Developed by Sony
Operating Systems Security
Introduction
CIS Benchmarks
CIS Benchmarks from the Center for Internet Security (CIS) are a set of globally
recognized and consensus-driven best practices to help security practitioners
implement and manage their cybersecurity defenses.
Applicable on:
Operating Systems
Introduction
Cloud Infrastructure & Services
Server Software
Desktop Software
Mobile Devices
Network Devices
Multi-function Print Devices
CIS Benchmarks - Levels
Level 1: Configuration recommendations for the Level 1 profile are basic
security recommendations for configuring IT systems. They are easy to follow
and do not impact business functionality or uptime.
Level 2: Level 2 profile configuration recommendations work best for highly
sensitive data where security is a priority. Implementing these
Introduction
recommendations requires professional expertise and diligent planning to
achieve comprehensive security with minimal disruptions.
STIG Profile: The Security Technical Implementation Guide (STIG) is a set of
configuration baselines from the Defense Information Systems Agency (DISA).
The US Department of Defense publishes and maintains these security
standards.
Tools for OS Configuration
Review
Microsoft Security Compliance Toolkit (SCT): Contains security baselines for all
Windows based Operating Systems with special considerations for Active
Directory
Introduction
Nessus/Nipper: Useful for performing offline configuration review of network
devices against CIS benchmarks through exported configuration files
Nessus/Nexpose: Performs online configuration review of Linux & other
operating systems against CIS Benchmarks.
Scuba Database Scanner: Scan enterprise databases for vulnerabilities and
misconfiguration
Defence in Depth Model
Introduction
Kali Linux
Kali Linux is a Linux distribution designed for digital forensics and penetration
testing. It is maintained and funded by Offensive Security.
System Requirements:
Cybersecurity
(Pen testing, Bug Bounty Hunting,
Cyber Defence)
Use of OSINT
OSINT Tools
OSINT Framework
Google Dorks
MISP
Dark Owl
The Harvester (included in Kali
Linux Distribution)
Security Trails API
BGP View
Shodan
CVE DB
Mikata
Threats to Mobile Security
Cyber Crimes related to
Mobile
Mobile Attack Vectors &
Techniques
Exploiting mobile OS vulnerabilities
Abusing permissions and access rights
Attacking mobile app communication protocols
Leveraging mobile device management (MDM) weaknesses
Social engineering attacks targeting mobile users
Mobile Security – Best
Practices
THANK YOU