Skip to content

Commit

Permalink
vault backup: 2024-03-02 04:28:10
Browse files Browse the repository at this point in the history
  • Loading branch information
We1337-alpha committed Mar 2, 2024
1 parent d793031 commit bc7788d
Show file tree
Hide file tree
Showing 206 changed files with 1,304 additions and 88 deletions.
56 changes: 28 additions & 28 deletions .obsidian/workspace.json
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@
"type": "markdown",
"state": {
"file": "Clueless/Clueless.md",
"mode": "preview",
"mode": "source",
"source": true
}
}
Expand Down Expand Up @@ -69,8 +69,7 @@
}
],
"direction": "horizontal",
"width": 200,
"collapsed": true
"width": 387.5
},
"right": {
"id": "1544261877281083",
Expand Down Expand Up @@ -149,32 +148,33 @@
},
"active": "f4c91365d1911b19",
"lastOpenFiles": [
"WiFi Frequences.md",
"Viruses.md",
"Clueless/Clueless.md",
"Ad Hoc Networking.md",
"802.11.md",
"Configuring Router's WiFi.md",
"WiFi Essentials.md",
"Domain Names.md",
"MX Records.md",
"SPF Records.md",
"POP3.md",
"IMAP.md",
"Exchange Servers.md",
"Email Technologies.md",
"FTP.md",
"HTTP.md",
"DNS.md",
"Layer 7 - _Application Layer_.md",
"SSH.md",
"SSL - TLS _(Basic Understanding)_.md",
"Layer 6 - _Presentation Layer_.md",
"Sockets.md",
"Layer 5 - _Session Layer_.md",
"445.md",
"443.md",
"389.md",
"161 & 162.md",
"Worms.md",
"Trojans.md",
"RATs.md",
"Keyloggers.md",
"Malware.md",
"Spear Phishing.md",
"Phishing.md",
"Dos & DDoS Attacks.md",
"Common Attacks.md",
"Anamoly-Based Intrusion Prevention Systems.md",
"Signature-Based Intrusion Prevention Systems.md",
"Digital Signatures _(Basic Understanding)_.md",
"IPsec _(Basic Understanding)_.md",
"Bastion Hosts.md",
"VPN Tunneling _(Basic Understanding)_.md",
"Least Previlage.md",
"Password Policies.md",
"SHA1, SHA2.md",
"MD5.md",
"Hashing.md",
"PGP.md",
"Asymettric Encryption _(Basic Understanding)_.md",
"DES.md",
"AES.md",
"Clueless/Clueless",
"Clueless/Basic BIOS Configurations",
"Cluless",
"Clueless"
Expand Down
28 changes: 28 additions & 0 deletions ACLs.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,28 @@
In the realm of computer networking, **ACLs (Access Control Lists)** act as powerful tools for **controlling and filtering network traffic**. They function as sets of **predefined rules** that dictate how **routers and switches** handle incoming and outgoing data packets on a network.

Here's a breakdown of key aspects regarding ACLs:

**Types of ACLs:**

- **Standard ACLs:** These ACLs primarily filter traffic based on **source and destination IP addresses**. They offer basic control over allowing or denying traffic from specific network segments.
- **Extended ACLs:** These ACLs provide more granular control by applying additional filters, including **source and destination port numbers**, protocol type (e.g., TCP, UDP), and other packet attributes.

**Benefits of using ACLs:**

- **Enhanced security:** By controlling and filtering network traffic, ACLs can help to:
- **Prevent unauthorized access:** Deny access to sensitive systems and resources from unauthorized devices or networks.
- **Mitigate denial-of-service attacks:** Restrict traffic to specific services, preventing attackers from overwhelming systems with excessive requests.
- **Segment the network:** Implement network segmentation by creating separate zones with controlled access, improving overall security posture.
- **Improved network performance:** By filtering out unwanted traffic, ACLs can reduce network congestion and optimize bandwidth usage.

**Things to consider when using ACLs:**

- **Complexity:** Implementing and managing ACLs can be complex, especially for large networks.
- **Impact on performance:** Carefully designed ACLs should have minimal impact on network performance, but overly complex rules could introduce processing overhead.
- **Understanding network traffic:** Familiarity with network protocols and traffic patterns is crucial for effective use of ACLs.

**Here's an analogy to understand ACLs:**

Imagine a bouncer at a nightclub entrance. The bouncer acts like an ACL, enforcing specific criteria (e.g., age, dress code) to allow or deny entry (allow or deny network traffic). Standard ACLs would be like checking IDs (source IP address) at the entrance, while extended ACLs could consider additional factors like attire (port numbers) or VIP status (specific protocols).

**Remember:** ACLs are valuable tools for network security and management, but they require careful planning, configuration, and ongoing maintenance to ensure optimal effectiveness.
33 changes: 33 additions & 0 deletions AES.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,33 @@
AES, standing for **Advanced Encryption Standard**, is a **symmetric encryption algorithm** widely considered the **gold standard** for protecting electronic data. It offers a robust and **highly secure** way to scramble information, making it unreadable to unauthorized individuals.

**Key characteristics of AES:**

- **Symmetric encryption:** Utilizes the same secret key for both encryption and decryption.
- **Block cipher:** Operates on fixed-size blocks of data (typically 128 bits) during the encryption and decryption processes.
- **Strong and reliable:** Employs a complex mathematical structure called a **substitution-permutation network** to resist various attacks and ensure the confidentiality of encrypted data.
- **Widely adopted:** Used in various applications due to its **efficiency, security, and standardization** by the National Institute of Standards and Technology (NIST) in the US.

**Benefits of using AES:**

- **Highly secure:** Provides robust protection against a wide range of known attacks, making it a reliable choice for safeguarding sensitive information.
- **Efficient:** Offers good performance both in terms of speed and memory usage, making it suitable for various real-world applications.
- **Standardized:** Widely adopted and supported by various software and hardware implementations, ensuring compatibility and ease of use.

**Applications of AES:**

- **Securing communication channels:** Used in protocols like HTTPS (secure websites), secure messaging apps, and VPNs (Virtual Private Networks).
- **Protecting data at rest:** Employed to encrypt data stored on hard drives, databases, and other storage devices.
- **Securing data in transit:** Used to encrypt data being transferred over networks, such as during online transactions or file downloads.

**Key size variations:**

- While AES was initially defined with three key sizes (128, 192, and 256 bits), the **128-bit key size** is the most widely used and recommended for most applications.
- Larger key sizes (192 and 256 bits) offer theoretically stronger security but might not be necessary for all use cases due to potential performance overhead.

**Remember:** AES is a powerful tool for safeguarding sensitive information, but its effectiveness relies on:

- **Using a strong and unique secret key.**
- **Implementing proper key management practices to ensure its confidentiality and secure storage.**
- **Understanding the specific security requirements of your application to choose the appropriate key size.**

By understanding AES and its role in symmetric encryption, you can make informed decisions about protecting your valuable data in the digital world.
28 changes: 28 additions & 0 deletions Anamoly-Based Intrusion Prevention Systems.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,28 @@
In contrast to signature-based intrusion prevention systems (IPS), **anomaly-based intrusion prevention systems (AIPS)** take a different approach to safeguarding your network. Instead of relying on predefined patterns of known threats, they **identify and potentially block suspicious activity based on deviations from normal network behavior**.

**Think of it like anomaly detection in everyday life:**

- You expect certain patterns in your daily routine. If you suddenly receive an unexpected package or encounter unusual activity on your bank account, you'd likely consider it suspicious and investigate further.

**Similarly, AIPS function as follows:**

1. **Baseline Establishment:** During an initial learning phase, the AIPS gathers information about **typical network traffic patterns**, establishing a baseline for what constitutes normal activity. This might involve analyzing factors like traffic volume, protocol usage, user activity patterns, and resource utilization.
2. **Continuous Monitoring:** The AIPS continuously **monitors network traffic** in real-time, comparing it against the established baseline.
3. **Anomaly Detection:** If the AIPS detects **significant deviations** from the established baseline, it identifies the activity as **anomalous** and potentially malicious. This could involve unusual traffic spikes, unauthorized access attempts, or unexpected communication patterns.
4. **Alerting and Action:** Depending on the severity of the anomaly and the system's configuration, the AIPS might **trigger an alert** for further investigation, **block the suspicious traffic**, or take other pre-defined actions.

**Benefits of using anomaly-based IPS:**

- **Detection of unknown threats:** They can potentially **identify zero-day attacks** and novel threats that haven't yet been documented or incorporated into signature databases.
- **Adaptability:** AIPS can **adapt to changing network behavior** over time, automatically adjusting the baseline as needed.
- **Reduced false positives:** Compared to signature-based systems, they are generally **less prone to false positives** due to their focus on overall behavior patterns instead of specific signatures.

**Limitations of anomaly-based IPS:**

- **Tuning and configuration:** Setting up and fine-tuning AIPS can be **more complex** compared to signature-based systems, requiring careful configuration to avoid excessive false positives or missed detections.
- **Potential for false positives:** While less frequent than with signature-based systems, AIPS can still generate **false positives** due to legitimate but unusual network activity, requiring investigation and potential adjustments.
- **Performance impact:** Analyzing large amounts of data for anomaly detection can **impact network performance** to some extent, depending on the system's resources and configuration.

**In conclusion, anomaly-based IPS offer a valuable complementary approach to network security. Their ability to detect unknown threats and adapt to changing patterns makes them a powerful tool for combating evolving cyber threats. However, careful configuration and ongoing monitoring are essential to optimize their effectiveness and minimize potential drawbacks.**

**Remember, both signature-based and anomaly-based IPS have their unique strengths and limitations. Employing a layered security approach, combining both methods along with other security measures, is crucial for building a robust and comprehensive defense strategy against cyberattacks.**
51 changes: 51 additions & 0 deletions Asymettric Encryption _(Basic Understanding)_.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,51 @@
As opposed to symmetric encryption, which uses a single key for both encryption and decryption, **asymmetric encryption**, also known as **public-key cryptography**, employs a unique **key pair** to secure information. It offers a different approach, providing certain advantages in specific situations. Here's a basic understanding of asymmetric encryption:

**Core Concept:**

Imagine you want to send a secure message to someone, but you don't want to share a secret key directly (like in symmetric encryption). Asymmetric encryption provides a solution:

- **Key Pair Generation:** The sender creates a **key pair**, consisting of two mathematically linked keys:
- **Public Key:** This key is freely distributed to anyone who wants to send you encrypted messages. It acts like a public mailbox anyone can put messages into.
- **Private Key:** This key is **highly confidential** and kept securely by the sender. It acts like the only key that can open the mailbox and access the messages inside.

**Sending an Encrypted Message:**

1. The recipient (who wants to send a message) obtains the **sender's public key**.
2. They use the **sender's public key** and a specific encryption algorithm to scramble their message. This creates **ciphertext** that only the corresponding private key can decipher.
3. The encrypted message (ciphertext) is then sent to the sender.

**Decrypting the Message:**

1. Only the **sender** has the **private key** that matches the public key used for encryption.
2. The sender uses their **private key** and the same encryption algorithm to **decrypt** the received ciphertext, transforming it back into the original plain text message.

**Key Points:**

- **Key Pair:** The security relies on the **mathematical relationship** between the public and private keys. While the public key can be shared openly, the private key must be **kept secret** by the owner.
- **Confidentiality:** Only the intended recipient (with the private key) can decrypt the message, ensuring confidentiality.
- **Non-repudiation:** The sender can prove they sent the message using their private key for digital signatures (explained later).

**Analogy:**

Think of asymmetric encryption as a secure mailbox with two locks:

- **Public Lock:** Anyone can use their own key (public key) to put messages in the mailbox (encrypting for the recipient).
- **Private Lock:** Only the mailbox owner (with the private key) has the key to open the mailbox and access the messages (decrypting messages sent to them).

**Real-World Examples:**

- **Secure communication channels (HTTPS websites, secure email protocols like S/MIME)**
- **Digital signatures:** Used to verify the authenticity and integrity of digital documents or messages.
- **Public-key infrastructure (PKI):** A system for managing digital certificates and public keys used in various security applications.

**While asymmetric encryption offers advantages like secure key distribution, it is generally:**

- **Slower** than symmetric encryption due to the complex mathematical operations involved.
- **Not ideal for bulk encryption** of large amounts of data due to performance limitations.

Therefore, **asymmetric and symmetric encryption are often used together** to leverage the strengths of each approach:

- **Asymmetric encryption:** Used for secure key exchange or digital signatures.
- **Symmetric encryption:** Used for encrypting the actual data due to its efficiency.

**Remember:** Asymmetric encryption is a powerful tool for specific security needs, but understanding its characteristics and potential drawbacks is crucial for effective application.
36 changes: 36 additions & 0 deletions Bastion Hosts.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,36 @@
## Bastion Hosts: Gatekeepers of Your Network Security

In the realm of cybersecurity, a **bastion host**, also known as a **jump server** or **jump box**, serves as a critical security component. It acts as a **dedicated server specifically designed to provide secure access to internal resources** while minimizing the attack surface of your network.

**Think of a bastion host as a fortified gatehouse:**

- **Location:** It's typically positioned at the **perimeter of your network**, often within a **demilitarized zone (DMZ)**, acting as a buffer between the public internet and your internal systems.
- **Limited functionality:** Unlike regular servers, **bastion hosts usually only run a single service**, such as SSH (Secure Shell) for remote access. This minimizes the attack surface and potential vulnerabilities.
- **Strict access control:** Only **authorized users** are granted access to the bastion host, and their access is **heavily monitored and controlled**. This further strengthens security by limiting potential entry points for attackers.

**Benefits of using a bastion host:**

- **Enhanced security:** By centralizing access and implementing strict controls, it significantly **reduces the risk of unauthorized access to internal systems**.
- **Reduced attack surface:** Limiting functionality and hardening the bastion host minimizes the potential impact of successful attacks.
- **Improved manageability:** Centralized access management simplifies user provisioning and access control processes.
- **Increased accountability:** Monitoring access logs on the bastion host allows for easier identification of suspicious activity and potential security breaches.

**Common use cases for bastion hosts:**

- **Remote access:** Providing secure access for authorized personnel to manage internal servers and resources from external locations.
- **System administration:** Offering a secure platform for system administrators to perform administrative tasks on internal systems.
- **Security audits:** Serving as a secure entry point for security professionals to conduct vulnerability assessments and penetration testing.

**However, implementing a bastion host also comes with certain considerations:**

- **Management overhead:** Setting up, configuring, and maintaining a bastion host requires additional technical expertise and resources.
- **Potential single point of failure:** If the bastion host is compromised, it could provide attackers with access to your entire internal network. Implementing redundant bastion hosts can mitigate this risk.
- **User experience:** Utilizing a bastion host might add an extra step to the access process for authorized users, potentially impacting convenience.

**Overall, bastion hosts are valuable security tools for organizations seeking to:**

- **Strengthen their network perimeter security.**
- **Centralize and control access to internal resources.**
- **Reduce the attack surface and potential impact of security breaches.**

**Remember, effective utilization of bastion hosts requires careful planning, implementation, and ongoing maintenance, but their security benefits can significantly enhance your overall network security posture.**
20 changes: 20 additions & 0 deletions CIA Triad.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,20 @@
The CIA Triad is a foundational model in **information security** that outlines three core principles for protecting sensitive information:

**1. Confidentiality:** This principle ensures that **authorized individuals** have access to information, while **unauthorized individuals** are **prohibited** from accessing it. Measures to achieve confidentiality include:

- **Access control:** Implementing mechanisms like passwords, permissions, and encryption to restrict access to authorized users only.
- **Data classification:** Categorizing information based on its sensitivity and implementing appropriate access controls for each category.

**2. Integrity:** This principle guarantees that information remains **accurate and unaltered** throughout its lifecycle, from creation to storage and transmission. Ensuring integrity involves:

- **Data validation:** Implementing mechanisms to verify the accuracy and completeness of data before processing or storage.
- **Audit trails:** Maintaining records of changes made to information, allowing for tracing and verification of modifications.
- **Hashing:** Using mathematical algorithms to create a unique digital fingerprint of data, enabling detection of any unauthorized modifications.

**3. Availability:** This principle ensures that **authorized individuals** have **timely and reliable access** to information when needed. Measures to achieve availability include:

- **Redundancy:** Creating backups of data on separate systems and locations to ensure access in case of primary system failure.
- **Disaster recovery:** Having plans and procedures in place to recover data and restore system functionality in case of natural disasters or other disruptions.
- **Scalability:** Ensuring that systems can handle expected and unexpected increases in demand to maintain access for authorized users.

The CIA Triad is a **crucial framework for organizations and individuals** to consider when implementing security measures for their information. By focusing on all three aspects – confidentiality, integrity, and availability – they can significantly enhance their information security posture and protect their valuable data.
Loading

0 comments on commit bc7788d

Please sign in to comment.