Skip to content

Commit

Permalink
Fix typos
Browse files Browse the repository at this point in the history
  • Loading branch information
undergroundwires committed Jun 7, 2021
1 parent 4a869e8 commit 53bad03
Show file tree
Hide file tree
Showing 61 changed files with 192 additions and 178 deletions.
6 changes: 3 additions & 3 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -49,7 +49,7 @@
2. Footprinting
1. [Footprinting overview](./chapters/02-footprinting/footprinting-overview.md)
2. [Search engines and online resources](./chapters/02-footprinting/search-engines-and-online-resources.md)
3. [WHOIS, GeoIpLocation and DNS interrogation](./chapters/02-footprinting/whois-geoiplocation-and-dns-interogation.md)
3. [WHOIS, GeoIpLocation and DNS interrogation](./chapters/02-footprinting/whois-geoiplocation-and-dns-interrogation.md)
4. [Email footprinting](./chapters/02-footprinting/email-footprinting.md)
5. [Website footprinting](./chapters/02-footprinting/website-footprinting.md)
6. [Network footprinting](./chapters/02-footprinting/network-footprinting.md)
Expand All @@ -61,8 +61,8 @@
5. [Bypassing IDS and firewall](./chapters/03-scanning-networks/bypassing-ids-and-firewall.md)
6. [Banner grabbing](./chapters/03-scanning-networks/banner-grabbing.md)
4. Enumeration
1. [Enumeration Overview](./chapters/04-enumaration/enumeration-overview.md)
2. [DNS enumeration](./chapters/04-enumaration/dns-enumeration.md)
1. [Enumeration Overview](./chapters/04-enumeration/enumeration-overview.md)
2. [DNS enumeration](./chapters/04-enumeration/dns-enumeration.md)
5. Vulnerabilities
1. [Vulnerability analysis](./chapters/05-vulnerabilities/vulnerability-analysis.md)
2. [Common vulnerabilities](./chapters/05-vulnerabilities/common-vulnerabilities.md)
Expand Down
6 changes: 3 additions & 3 deletions chapters/01-introduction/data-leakage-backup-and-recovery.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@

- Corporate espionage, phishing, malware
- Business partners, consultants when company outsources
- Less surveilance than own employees.
- Less surveillance than own employees.

#### Internal threats

Expand Down Expand Up @@ -83,7 +83,7 @@
- because backing-up everything is too costly and takes up much storage.
2. **Choose appropriate backup media**
- Reliable, solid, preferably cheap
- E.g. USBs or portable media for personal users, and HDD/SDDs for companies with PCIs for more speed.
- E.g. USBs or portable media for personal users, and HDD/SDDs for companies for more speed.
3. **Choose the appropriate backup strategy**
- Check features such as scheduling, monitoring file changes to update back-ups, protocols, integrations...
- Paid vs Free
Expand All @@ -99,7 +99,7 @@
- If A fails you can reconstruct based on data in B and C
- RAIDing is not only for backups, can also use for faster read and writes
- E.g. BIG = Everything is seen as one drive. File is written two all of them. Crazy write & read speeds. If single disk dies all data is gone.
5. **Choose the appropiate backup method**
5. **Choose the appropriate backup method**
- **Cold backup**
- Performed while system is not in use.
- E.g. at nights, during weekends.
Expand Down
2 changes: 1 addition & 1 deletion chapters/01-introduction/hacker-types.md
Original file line number Diff line number Diff line change
Expand Up @@ -54,7 +54,7 @@

## Grey hat hackers

- Also known as ***grayhat***, ***gray hat***, ***gray-hat***, ***grey hat***, ***grayhat*** or ***grey-hat*** hackers.
- Also known as ***grayhat***, ***gray hat***, ***gray-hat***, ***grey hat***, ***greyhat*** or ***grey-hat*** hackers.
- 📝 Might break laws, regulations and ethical standards but do not have explicitly malicious indent.
- Middleground; Not as bad as black, not as ethical as white hackers.

Expand Down
6 changes: 3 additions & 3 deletions chapters/01-introduction/hacking-stages.md
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@
- In scanning you're acting on gathered information to gather information
- Examples

| Reconnaissance | Scanning |
| [Reconnaissance](#1-reconnaissance) | [Scanning](#2-scanning) |
| ------ | ----- |
| Scan the perimeter network you need the IP addresses | Use e.g. `nmap` to figure out what the configuration is. |
| Get e-mails. | Use phishing to gather personal data |
Expand All @@ -41,7 +41,7 @@
- Keeping admin/root privileges so hacker can continue using the system.
- After breaking into a system, you attempt to elevate privileges to do more.
- Maintain persistent access, because your connection might break, then you start again
- Can prevent other hackers from accessing the system by installing backdoors, rootkits, or Trojans.
- Can prevent other hackers from accessing the system by installing backdoors, rootkits, or trojans.
- 💡 You can install tools to give you persistance access and gathers data to use compromise more such as keylogger.
- 💡 You can use the machine as proxy so all traces are lead back to the proxy.
- You can minimize the risks being discovered this way.
Expand All @@ -56,5 +56,5 @@
- Activities:
- Clear certain entries in log files: Not all, or it'll be suspicious
- Masquerade your activities: Make them as similar as possible as legitimate activities
- E.g. good keyloggers masquerades itself behind legitimate activities
- E.g. a good keylogger masquerade itself behind legitimate activities
- Mimics other programs behavior by adding more behavior.
Original file line number Diff line number Diff line change
Expand Up @@ -115,4 +115,4 @@
- Directory service
- Data synchronization
- Metadirectory
- Virtual Directory
- Virtual directory
8 changes: 7 additions & 1 deletion chapters/01-introduction/incident-management.md
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,13 @@
9. **Post-incident activities** (lessons learnt)
- Record what happened with final review.
- Have discussion about how to avoid it in future.
- 🤗 E.g. a developer in [Dropbox miscoded](https://www.cnet.com/news/dropbox-confirms-security-glitch-no-password-required/) authentication function to always return true. Anyone could login as whichever you user you want by just typing their e-mail. They had review policy but no one paid attention. They had protocols against major breach. Realized that it was critical and then they brought down the service to prevent huge damage (containment), and conducted investigation to see what has happened and started recovery process. It was recorded and documented for current and future employees.
- 🤗 E.g. a developer in [Dropbox miscoded](https://www.cnet.com/news/dropbox-confirms-security-glitch-no-password-required/) authentication function to always return true.
- Anyone could login as whichever you user you want by just typing their e-mail.
- They had review policy but no one paid attention.
- They had protocols against major breach.
- Realized that it was critical and then they brought down the service to prevent huge damage (containment)
- Conducted investigation to see what has happened and started recovery process
- It was recorded and documented for current and future employees

## Emergency response plan

Expand Down
2 changes: 1 addition & 1 deletion chapters/01-introduction/information-security-controls.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@
- **Availability**: At all times data needs to be available to those who need it, e.g. stock market
- **Confidentiality**: No leaks, e.g. ensuring policies are in-place
- **Authenticity**: Only those who are authorized can access something
- **Non-repudition**: If you do something, you cannot say I did not do it, e.g. signatures, log files, camera videos.
- **Non-repudiation**: If you do something, you cannot say I did not do it, e.g. signatures, log files, camera videos.
- Processes to achieve information assurance are:
- Security policies
- Network and user authentication strategy
Expand Down
6 changes: 3 additions & 3 deletions chapters/01-introduction/information-security-overview.md
Original file line number Diff line number Diff line change
Expand Up @@ -61,7 +61,7 @@
5. Patch is created
- Sometimes vendor may not patch it e.g. if software is outdated or has no support.
6. Patch is applied
- Sometimes they're not! E.g. home routers has vulnerabilities that has been known for years as ISPs do not usually configure routers after setup.
- Sometimes they're not! E.g. home routers has vulnerabilities that has been known for years as ISPs do not usually configure routers after setup
- Timeframe between patch is created and applied is used by malicious hackers to maximum extend.
- Many times corporations are slower to react which causes harm.

Expand Down Expand Up @@ -91,14 +91,14 @@
- Get access to one of the systems
- E.g. an Android phone. They have many vulnerabilities.
- They don't get updates after a while.
- If they exceed design limits e.g. when operating when it's hot outside, then the hardware flaws occuring causes exploaitable software attacks such as [Bitsquatting](https://en.wikipedia.org/wiki/Bitsquatting)
- If they exceed design limits e.g. when operating when it's hot outside, then the hardware flaws occurring causes exploitable software attacks such as [Bitsquatting](https://en.wikipedia.org/wiki/Bitsquatting)
5. Get access to
- Information such as bank accounts, credit card details
- After infecting one device, jump other devices in bank network if e.g. the mobile phone is also used in bank network.

### Doxing

- Finding and publishing someone's personally identifial information for malicious reasons.
- Finding and publishing someone's personally identifiable information (PII) for malicious reasons.
- E.g. an individuals name, e-mail address or sensitive data of an organization.
- E.g. confidential government files get leaked to the public.
- Steps
Expand Down
4 changes: 3 additions & 1 deletion chapters/01-introduction/laws-standards-and-regulations.md
Original file line number Diff line number Diff line change
Expand Up @@ -59,7 +59,9 @@

- Set of worldwide information security standards
- Also known as ***ISMS Family of Standards*** or ***ISO27K***
- **ISO/IEC** = The International Standard for Standardization (ISO) and the International Electrotechnical Commission (IEC)
- ISO/IEC stands for
- "The International Standard for Standardization (ISO)"
- and "The International Electrotechnical Commission (IEC)"

### ISO/IEC 27001:2013

Expand Down
4 changes: 2 additions & 2 deletions chapters/01-introduction/penetration-testing.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
- discover vulnerabilities (and document)
- evaluate the security
- Detailed analysis of weaknesses in design, technical flaws, and vulnerabilities in organizations information security.
- E.g. • [phishing](./../10-social-engineering/social-engineering-types.md#phishing)[testing authentication](./../13-web-applications/hacking-web-applications.md#authentication-attacks) using [dictionaries](./../06-system-hacking/cracking-passwords-overview.md#dictionary-attack) • test if router is using an [obselete OS](./security-threats-and-attacks.md#operating-system-attacks)
- E.g. • [phishing](./../10-social-engineering/social-engineering-types.md#phishing)[testing authentication](./../13-web-applications/hacking-web-applications.md#authentication-attacks) using [dictionaries](./../06-system-hacking/cracking-passwords-overview.md#dictionary-attack) • test if router is using an [obsolete OS](./security-threats-and-attacks.md#operating-system-attacks)

## Purpose

Expand Down Expand Up @@ -130,7 +130,7 @@
## Security testing methodology

- Approach to attempt to find vulnerabilities in the system's security mechanisms.
- Used during e.g. [security audit](#security-audit), [vulnerability assesment](#vulnerability-assessment) and [penetration test](#penetration-test).
- Used during e.g. [security audit](#security-audit), [vulnerability assessment](#vulnerability-assessment) and [penetration test](#penetration-test).
- 💡 Using a good security testing methodology provides a repeatable framework

### Proprietary methodologies
Expand Down
4 changes: 2 additions & 2 deletions chapters/01-introduction/security-policies.md
Original file line number Diff line number Diff line change
Expand Up @@ -90,11 +90,11 @@

- Same as **Terms of Service** or **Terms of Use**
- 📝 Description of what constitutes acceptable and unacceptable use of the Internet
- Code of conduct governing the behaviour of a user whilst connected to the network/Internet.
- Code of conduct governing the behavior of a user whilst connected to the network/Internet.
- E.g.
- ISP providers allows you to use unlimited bandwidth
- In contract you see it says it's about "fair use"
- Fair use can be e.g. to not exceed 50% maximum potential bandwith that could be used with that bandwidth
- Fair use can be e.g. to not exceed 50% maximum potential bandwidth that could be used with that bandwidth
- Prohibiting port scanning or security scanning
- Never revealing a password

Expand Down
4 changes: 2 additions & 2 deletions chapters/02-footprinting/email-footprinting.md
Original file line number Diff line number Diff line change
Expand Up @@ -47,9 +47,9 @@
- Combination of two protocols SPF + DKIM
- It builds on them and adds more policy

## Verifying email legitimity
## Verifying email legitimacy

- Double check FROM
- Double check `FROM`
- Check the spelling in domain name so it's coming from the domain of the company
- If it's random e-mail check if it's from one of the biggest domain providers or if something legit.
- Check IP of the domain
Expand Down
18 changes: 9 additions & 9 deletions chapters/02-footprinting/footprinting-overview.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,14 +15,14 @@
- 📝 No direct contact with target
- Rely on information that is publicly available.
- Most difficult to detect
- E.g. • News • job postings • [WHOIS](./whois-geoiplocation-and-dns-interogation.md#whois) databases • government records • document sifting • [dumpster diving | Social engineering](./../10-social-engineering/social-engineering-types.md#dumpster-diving)[competitive analysis](#competitive-intelligence) • browser search • map lookup • DNS lookup • Facebook/Twitter search
- E.g. • News • job postings • [WHOIS](./whois-geoiplocation-and-dns-interrogation.md#whois) databases • government records • document sifting • [dumpster diving | Social engineering](./../10-social-engineering/social-engineering-types.md#dumpster-diving)[competitive analysis](#competitive-intelligence) • browser search • map lookup • DNS lookup • Facebook/Twitter search

#### Open-source intelligence (OSINT)

- 📝 Collection and analysis of information that is gathered from public, or open, sources
- ❗ "Open-source" is unrelated to open-source software or collective intelligence
- Categories: • media • internet • public government data • professional and academic publications • commercial data • grey literature
- [awesome-osint | list of tools](https://github.com/jivoi/awesome-osint), [osintframework | graph of tools](https://osintframework.com/)
- [awesome-osint | list of tools](https://github.com/jivoi/awesome-osint), [OsintFramework | graph of tools](https://osintframework.com/)

#### Competitive intelligence

Expand All @@ -31,7 +31,7 @@
- Tools include
- Traffic statistics: [Alexa](https://alexa.com)
- News: [Google finance](https://finance.google.com)
- Company plans/financials: • [SEC Info](https://www.secinfo.com)[Experian](https://experian.com) • [Market Watch](https://marketwatch.com)[Wall Street Monitor](https://twst.com)[Euromonitor](https://euromonitor.com)
- Company plans/finances: • [SEC Info](https://www.secinfo.com)[experian](https://experian.com) • [Market Watch](https://marketwatch.com)[Wall Street Monitor](https://twst.com)[EuroMonitor](https://euromonitor.com)
- Company origins and development: • [EDGAR Database](https://sec.gov/edgar.shtml)[Hoovers](https://hoovers.com)[LexisNexis](https://lexisnexis.com)[Business Wire](https://businesswire.com)

### Active footprinting
Expand All @@ -42,21 +42,21 @@
- Examples
- Buying beers for company employees to see what you can extract.
- Network mapping with `nmap`, perimeter mapping, port scanning, web profiling...
- • E-mail tracking • Phishing scheme with an email • Querying name servers • File metadata • Social engineering • Extracting DNS information • Ttraceroute analysis
- • E-mail tracking • Phishing scheme with an email • Querying name servers • File metadata • Social engineering • Extracting DNS information • [Traceroute](./network-footprinting.md#traceroute) analysis
- 💡 Easier idea to start with passive footprinting by gathering all publicly available data
- Then organizing it, and putting in one place.
- Then use active footprinting with starting probing for ports, networks, possible vulnerabilities etc.
- 💡Good to learn more about stuff (employees) of a company
- through them you can learn a lot more and gain a lot more access
- e.g. contact them through social media and start a conversation
- e.g. join a conference that you see the person is attending on Linkedin and meet him.
- e.g. join a conference that you see the person is attending on LinkedIn and meet him.

## Footprinting information

- **Network information**
- Domains, subdomains
- IP addresses
- [Whois](./whois-geoiplocation-and-dns-interogation.md#whois) and DNS records
- [Whois](./whois-geoiplocation-and-dns-interrogation.md#whois) and DNS records
- VPN firewalls using e.g. [ike-scan](https://github.com/royhills/ike-scan)
- **System information**
- Web server operating systems
Expand Down Expand Up @@ -98,10 +98,10 @@
- **[Recon-dog](https://github.com/s0md3v/ReconDog)**
- Open-source CLI tool self-claimed as Reconnaissance Swiss Army Knife
- Can extracts targets from STDIN (piped input) and act upon them
- Passive reconnaissance tool extracting all information with APIs without any contact witht target
- **[Dmitry](https://github.com/jaygreig86/dmitry)** (Deepmagic Information Gathering Tool)
- Passive reconnaissance tool extracting all information with APIs without any contact with target
- **[Dmitry](https://github.com/jaygreig86/dmitry)** (DeepMagic Information Gathering Tool)
- CLI tool to analyze a website e.g. `dmitry https://cloudarchitecture.io`
- • Performs [WHOIS](./whois-geoiplocation-and-dns-interogation.md#whois) lookup on IP and domain • Retrieves [Netcraft](./search-engines-and-online-resources.md#netcraft) information • Search for subdomains/email addresses • Performs TCP scanning • Grabs banner for each port
- • Performs [WHOIS](./whois-geoiplocation-and-dns-interrogation.md#whois) lookup on IP and domain • Retrieves [Netcraft](./search-engines-and-online-resources.md#netcraft) information • Search for subdomains/email addresses • Performs TCP scanning • Grabs banner for each port

## Footprinting reports

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@
| **`AND`** | Results related to both X and Y, google default. | `jobs AND gates` |
| **`-`** | Exclude a term or phrase | `jobs ‑apple` |
| **`*`** | Wildcard that will match any word or phrase. | `"Google * my life"` > google changed my life, google runs my life... |
| **`(`**, **`)`** | Group multiple terms | `(ipad OR iphone) apple` |
| **`(`**, **`)`** | Group multiple terms | `(iPad OR iPhone) apple` |

- E.g. finding passwords: `intext:"please change your" password | code | login file:pdf | doc | txt | docx -github`
- **`intext`**: in the text of the website
Expand Down Expand Up @@ -58,7 +58,7 @@
1. Queries Google for different filetypes that may have metadata
- Combining `site:` and `filetype` dorks
2. Downloads the documents to disk and extracts the metadata of the file
3. Parses files using different libraries for metadata (e.g. Hachoir, Pdfminer)
3. Parses files using different libraries for metadata (e.g. Hachoir, pdfminer)

## Online services

Expand All @@ -76,7 +76,7 @@
### Video search engines

- Search video related to target and extract video information
- E.g. • Youtube • Google Videos
- E.g. • YouTube • Google Videos
- Video analysis tools include • YouTube DataViewer • EZGif • VideoReverser.com,

### Meta data engines
Expand Down
6 changes: 3 additions & 3 deletions chapters/02-footprinting/website-footprinting.md
Original file line number Diff line number Diff line change
Expand Up @@ -43,9 +43,9 @@
- In most of browsers you can right click and how source
- Walkthrough
- In almost any browser: Right click => Show source
- Check for HTML `<!-- comment -->` or JavaScript `// comment` comments.
- They are kipped by interpretors and compilers, only for human eyes
- They can be instructions for other devs, notes for themselves.
- Check for HTML `<!-- comment -->` or JavaScript `// comment` comments
- They are skipped by interpreters and compilers, only for human eyes
- They can be instructions for other developers, notes for themselves
- E.g. this library won't work as this element is not supported
- Gives you clues about what technology (frameworks, languages) they use in the background

Expand Down
Loading

0 comments on commit 53bad03

Please sign in to comment.