Tag Archives: network security

Network Utility: NetCat Cheat Sheet

As per Wikipedia definition, Netcat is a general-purpose command-line tool for reading, writing, redirecting, and encrypting data across a network. It aims to be your network Swiss Army knife, handling a wide variety of security testing and administration tasks. Netcat is suitable for interactive use or as a network-connected back end for other tools.

Reading more in

https://www.hackingtutorials.org/networking/hacking-with-netcat-part-1-the-basics/

CyberSecurity: Click Here to Kill Everyone – By Bruce Schneier

This article is the most detailed one & have a full summary of cybersecurity stuff. As per Bruce Schneier, With the Internet of Things, we’re building a world-size robot. How are we going to control it? 

Abstract

Last year, on October 21, your digital video recorder — or at least a DVR like yours — knocked Twitter off the internet. Someone used your DVR, along with millions of insecure webcams, routers, and other connected devices, to launch an attack that started a chain reaction, resulting in Twitter, Reddit, Netflix, and many sites going off the internet.

The internet is no longer a web that we connect to. Instead, it’s a computerized, networked, and interconnected world that we live in. This is the future, and what we’re calling the Internet of Things.

Take a concrete example: modern cars, those computers on wheels. The steering wheel no longer turns the axles, nor does the accelerator pedal change the speed. Every move you make in a car is processed by a computer, which does the actual controlling. A central computer controls the dashboard. There’s another in the radio. The engine has 20 or so computers. These are all networked, and increasingly autonomous.

Security is an arms race between attacker and defender. Technology perturbs that arms race by changing the balance between attacker and defender. Understanding how this arms race has unfolded on the internet is essential to understanding why the world-size robot we’re building is so insecure, and how we might secure it. To that end, I have five truisms, born from what we’ve already learned about computer and internet security. They will soon affect the security arms race everywhere.

Truism No. 1: On the internet, the attack is easier than defense.

Truism No. 2: Most software is poorly written and insecure.

Truism No. 3: Connecting everything to each other via the internet will expose new vulnerabilities.

Truism No. 4: Everybody has to stop the best attackers in the world.

Truism No. 5: Laws inhibit security research.

To read full article.. Check below link.

https://nymag.com/intelligencer/2017/01/the-internet-of-things-dangerous-future-bruce-schneier.html

CyberSecurity: Reading my next book (Attacking Network protocols)

Today I received my new book “Attacking Network Protocols” from James ForshawBook seems promising & lots of interesting topics. Let’s see how it goes. 

My objective to read my new book is to get a deep understanding of network protocols, Networking layers & internal working of the internet. These are the core & foundational pillar of the internet. It also provides details about how to secure & break network protocols by stuff like sniffing data packets & finding vulnerabilities.

So far I have read multiple books on cybersecurity and some of them are:

  • Iron-Clad Java: Building Secure Web Applications: Every IT person should read this book. Basically, This is one of the best books for anyone who is involved in IT project development work. It explains a lot of good examples, practices & common mistake done by the developers. Also, Very much recommended for cybersecurity newbie like me.
  • Hacking: Hacking Practical Guide for Beginners: This isn’t great for the beginner, however, good for those who are looking to understand penetration testing & hacking stuff. This book has very precise information about a few important topics in penetration testing.
  • A few Online papers. will detail some of the important papers in some other posts.

Will keep updating as I read through this book.