Definitions Evil Twin Access point which looks like a legitimate access point but is actually maliciousOften copies SSID Rogue Access Point Unauthorized access point on a network Bluesnarfing Unauthorized access to data on a device via bluetooth Bluejacking Sending unsolicited messages to another device via Bluetooth Disassociation Attacks Denial of service attack which prevents WAP…
Category: Learning
Module 1.2 – Given a scenario, analyse potential indicators to determine the type of attack.
Malware A blanker term for software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system. Virus Software that can reproduce itself Programme Virus Virus which is bundled with an application Boot Sector Virus Virus that installs in the boot sector so it executes with the OS Script Virus Script based…
Security+ SYO-601 Content
Hi all, this is a dictionary page! SYO-601 covers a lot of content in a fairly shallow manner. Rather than spam the site I’m putting a page here with a number of private root posts covering each section.
Understand the Cyber Kill Chain
Welcome to Day 2. today we’re covering the Cyber Kill Chain. The Cyber Kill Chain is an attack framework is a framework created by Lockheed Martin in 2011. It is an adaptation of an existing military concept. While far from perfect as the security world has developed significantly in the past 10 years it’s an…
Threat Intelligence Sources
Notes from Security 601+ – Module 1.5 threat intelligence is an essential tool for cyber security practitioners. While it’s all well and to have a system in place to react to threats additional work needs to be done to proactively prepare for threats BEFORE it happens. The issue is, how can a single researcher or…
A brief summary of the Pyramid of Pain
Hello everyone Welcome to my 1st knowledge post! We’ve adopted kittens this week so it is pretty manic here in the Raine/Ford household (obligatory cat photo at the end for you attentive readers). As a starting point I’ve been working through tryhackme. It’ been a great resource to learn and get some of specifics I’ve…