List of network scanning tools: nmap hping3 NetScanTools Pro Advanced Port Scanner SuperScan PRTG Network Monitor OmniPeek MiTeC Network Scanner NEWT Professional MegaPing Slitheris Network Discovery TamoSoft’s CommView IP Scanner IP-Tools Network Scanner Global Network Inventory SoftPerfect Network Scanner CurrPorts Masscan DRACNMAP NEET Most common are nmap, hping3, NetScanTools Pro and Advanced Port Scanner. […]
Types of Clouds
Private Cloud: A private cloud, also known as internal or corporate cloud, is a cloud infrastructure that a single organization operates solely. The organization can implement the private cloud within a corporate firewall. Organizations deploy private cloud infrastructures to retain full control over corporate data. Public Cloud: In this model, the provider makes services such […]
Types of Wi-Fi Connections
Encryption algorithms: RC4 AES Encryption protocols: Temporal Key Integration Protocol (TKIP) Cipher-block Chaining Message authentication Protocol (CCMP) Wi-Fi security modes: WEP WPA WPA2 Authentication options supported by WPA, WPA2 and WPA3: Preshared key (PSK) or personal (PER) IEEE 802.1X or enterprise (ENT)router connection PSK is the use of a static fixed password or authentication. ENT […]
Public Vulnerability Databases
List of Vulnerability Databases Exploit Database https://www.exploit-db.org CVE https://cve.mitre.org/ Security Focus http://www.securityfocus.com NDV Database https://ndv.nist.org Open Source Vulnerability Database (OSVDB) http://www.osvdb.org Now defunct.
Cybersecurity Attack Phases
According to EC-Council EC-Council identify in the CEH course 5 hacking phases: Reconnaissance Scanning Gaining Access Maintaining Access Clearing Tracks According to ISACA ISACA identify 8 phases in a cybersecurity generalized attack processs: Perform reconnaissance Create attack tools Deliver malicious capabilities Exploit and compromise Conduct an attack Achieve results Maintain a presence or set of […]
How to get Certified Ethical Hacker (CEH) Certification
Certified Ethical Hacker (CEH) program is a set of certifications provided by EC-Council and related to cybersecurity. CEH is a certificate that appears in most of the professional certification paths suggested by EC-Council, so it can be considered a core module on Cybersecurity among all the ones offered by EC-Council. Based on my personal experience, […]
ISACA Cybersecurity Nexus
Cybersecurity Nexus (CSX) is a training and credentialing program related to cybersecurity and develop by the professional association ISACA. It consists of a series of certificates: CSX Fundamentals (CSX-F) Certificate CSX Foundations Certificate, is awarded automatically when the candidate achieves: CSX Network Application and Configuration Certificate CSX Linux Application and Configuration Certificate CSX Packet Analysis […]
How to pass Cybersecurity Fundamentals CSX-F Certificate
CSX-F, acronym of Cybersecurity Fundamentals, was a certificate issued by professional association ISACA that demonstrates knowledge on cybersecurity. It was the entry-level exam for ISACA’s Cybersecurity Nexus (CSX) certificate series. Important note: As of 2022, it seems that CSX-F certificate has been superseded by ITCA Cybersecurity Fundamentals Certificate. CSX-P (Cybersecurity Nexus Practitioner) is an advanced-level […]
Common Cybersecurity Attacks
Non-exhaustive list of common Cybersecurity Attacks: Brute-force Attack Cross-Site Request Forgery (XSRF) Cross-Site Scripting (XSS) Denial of Service (DoS) Man-in-the-middle (MITM) Rogue access point Session hijacking Spoofing of data packets SQL Injection Detailed List Brute-force Attack A brute-force attack (a.k.a. brute force cracking) is the cyberattack equivalent of trying every key on your key […]