cybersecurity tips, tools, and techniques

53
Cybersecurity Tips, Tools and Techniques for Your Professional Tool Bag Ron Woerner, CISSP, CISM Bellevue University @ronw123 10/23/2019 Ron Woerner

Upload: others

Post on 18-Dec-2021

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cybersecurity Tips, Tools, and Techniques

Cybersecurity Tips, Tools and Techniques

for Your Professional Tool Bag

Ron Woerner, CISSP, CISM

Bellevue University

@ronw123

10/23/2019 Ron Woerner

Page 2: Cybersecurity Tips, Tools, and Techniques

WhoAmI – Ron Woerner

• President / Chief Trusted Advisor • Cybersecurity Instructor, Bellevue University• 25+ years experience in IT / Security• CISSP, CISM• Blogger, podcaster & writer • Given tons’o presentations on security and Internet safety

10/23/2019 Ron Woerner

Page 3: Cybersecurity Tips, Tools, and Techniques

Thoughts are

my own

Use at your own risk

10/23/2019 Ron Woerner

Page 4: Cybersecurity Tips, Tools, and Techniques

Apologies in

advance for

broken links

Content as of October 2019

10/23/2019 Ron Woerner

Page 5: Cybersecurity Tips, Tools, and Techniques

What the $%$# are

we doing here?

Tools, applications,

websites, references,

other stuff that can help

you do you job.

Cybersecurity tips to keep

yourself, others, and

hopefully your company

out of trouble.10/23/2019 Ron Woerner

Page 6: Cybersecurity Tips, Tools, and Techniques

First Some Basics

10/23/2019 Ron Woerner

Page 7: Cybersecurity Tips, Tools, and Techniques

If you only remember 1 slide…

https://www.stopthinkconnect.org/https://staysafeonline.org/

https://niccs.us-cert.gov/national-cybersecurity-awareness-month-2019

10/23/2019 Ron Woerner

Page 8: Cybersecurity Tips, Tools, and Techniques

“The art and science of skillfully maneuvering humans to

take an action that may or may not be in their own best interests.”

Chris Hadnagy, Social Engineering, The Science of Human Hacking

#1 Overall Tool - Humans

10/23/2019 Ron Woerner

Page 9: Cybersecurity Tips, Tools, and Techniques

#1 Technical Hacking Tool

https://www.google.com/advanced_search

10/23/2019 Ron Woerner

Page 10: Cybersecurity Tips, Tools, and Techniques

Time Travel

Google Cache

Archive.org – Wayback Machine

10/23/2019 Ron Woerner

Page 11: Cybersecurity Tips, Tools, and Techniques

Lists of tools, tips, & tricks

• SecTools

• Peerlyst List of Security Tools

• OlderGeeks

• HowToGeek.com, Geek School

10/23/2019 Ron Woerner

Page 12: Cybersecurity Tips, Tools, and Techniques

Cheat Sheets

• Peerlyst – Complete List of InfoSec Cheat Sheets

• Lenny Zeltser – IT and Information Security Cheat Sheets: https://zeltser.com/cheat-sheets/

• Malware Archeology (Auditing) –https://www.malwarearchaeology.com/cheat-sheets/

• OWASP –https://www.owasp.org/index.php/OWASP_Cheat_Sheet_Series

10/23/2019 Ron Woerner

Page 13: Cybersecurity Tips, Tools, and Techniques

Security Checklists / Publications

• NIST• CSRC: http://csrc.nist.gov/

• Publications: http://csrc.nist.gov/publications/PubsSPs.html

• Center for Internet Security • Controls: https://www.cisecurity.org/controls/

• Benchmarks: https://www.cisecurity.org/cis-benchmarks/

• CIS Controls Self-Assessment Tool, or CIS CSAT

• DISA IASE Security Technical Implementation Guides (STIGs)https://iase.disa.mil/stigs/Pages/index.aspx

10/23/2019 Ron Woerner

Page 14: Cybersecurity Tips, Tools, and Techniques

Tools and Technologies

10/23/2019 Ron Woerner

Page 15: Cybersecurity Tips, Tools, and Techniques

Finding Products

https://www.capterra.com/

10/23/2019 Ron Woerner

Page 16: Cybersecurity Tips, Tools, and Techniques

https://attack.mitre.org/

10/23/2019 Ron Woerner

Page 17: Cybersecurity Tips, Tools, and Techniques

Computing Environments –Creating a Test Lab

10/23/2019 Ron Woerner

Page 18: Cybersecurity Tips, Tools, and Techniques

Personal Labs – Virtual Environments

• Oracle VM VirtualBox• VMWare Workstation

• Windows 10 – Hyper-V• MacOS ParallelsLifeHacker – How to Set Up a Virtual Machine for Free

• Linux Distros

10/23/2019 Ron Woerner

Page 19: Cybersecurity Tips, Tools, and Techniques

Linux Distros

https://livecdlist.com/

https://distrowatch.com/

10/23/2019 Ron Woerner

Page 20: Cybersecurity Tips, Tools, and Techniques

Network Mapping

Nmap / ZenMap

10/23/2019 Ron Woerner

Page 21: Cybersecurity Tips, Tools, and Techniques

Network Mapping

Fing

(iOS & Android)

10/23/2019 Ron Woerner

Page 22: Cybersecurity Tips, Tools, and Techniques

Network Enumeration

Shodan (https://www.shodan.io/) – Search engine for

Internet-connected devices.

10/23/2019 Ron Woerner

Page 23: Cybersecurity Tips, Tools, and Techniques

Network Enumeration

Censys (https://www.censys.io/) - Find and analyze every

reachable server and device on the Internet.

10/23/2019 Ron Woerner

Page 24: Cybersecurity Tips, Tools, and Techniques

Network Vulnerability Detection

https://www.ssllabs.com/

10/23/2019 Ron Woerner

Page 25: Cybersecurity Tips, Tools, and Techniques

VPNs Commercial

• Hotspot Shield

• Tunnel Bear

• Windscribe

• Deeper Networkhttps://deeper.network/

Algo VPN with DigitalOcean 1. Create an account on a cloud

hosting provider like DigitalOcean

2. Download Algo VPN on your local computer, unzip it

3. Install the dependencies with the command lines on this page

4. Run the installation wizard

5. Double click on the configuration profiles in the configs directory

10/23/2019 Ron Woerner

Page 26: Cybersecurity Tips, Tools, and Techniques

DNS Servers

• Google Public DNS – 8.8.8.8 and 8.8.4.4

• Cloudflare – 1.1.1.1 and 1.0.0.1

• Quad9 – 9.9.9.9 and 149.112.112.112

• OpenDNS (Cisco) – 208.67.222.222 and 208.67.220.220

• Verisign – 64.6.64.6 and 64.6.65.6

10/23/2019 Ron Woerner

Page 27: Cybersecurity Tips, Tools, and Techniques

Windows Administration

SysInternals Suite• Autoruns

• Process Explorer

• Process Monitor

Video: Mark Russinovich, Malware Hunting

10/23/2019 Ron Woerner

Page 28: Cybersecurity Tips, Tools, and Techniques

Windows Administration

GodMode• Create a new folder and edit it so that it is named the

following and then press enter.• GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}

• When done, you should have an icon on your desktop

10/23/2019 Ron Woerner

Page 29: Cybersecurity Tips, Tools, and Techniques

Windows Administration

PowerShell• Using Windows PowerShell• PowerShell.exe Command-Line Help

PowerToys• Windows Key Shortcut Guide

• FancyZones

https://github.com/microsoft/PowerToys

10/23/2019 Ron Woerner

Page 30: Cybersecurity Tips, Tools, and Techniques

AntiVirus

• VirusTotal – https://www.virustotal.com/

• AVG AntiVirus FREE

• Avira

• Avast

• Adaware

• Others… See https://www.tomsguide.com/us/best-free-antivirus,review-6003.html

Free for personal use (not business)10/23/2019 Ron Woerner

Page 31: Cybersecurity Tips, Tools, and Techniques

Linux on Windows

Windows Subsystem for Linuxhttps://docs.microsoft.com/en-us/windows/wsl/about

Run bash.exeHTG Article: https://www.howtogeek.com/270810/how-to-quickly-launch-a-bash-shell-from-windows-10s-file-explorer/

10/23/2019 Ron Woerner

Page 32: Cybersecurity Tips, Tools, and Techniques

Network Vulnerability Detection

• Firewall Audit Tool:https://www.wallparse.com/

• Titania Nipper Studio*: https://www.titania.com/nipper-studio

• Solarwinds*: https://www.solarwinds.com/downloads

• Firewall Browser

• Network Configuration Manager

• IP Address Manager*Trial versions

10/23/2019 Ron Woerner

Page 33: Cybersecurity Tips, Tools, and Techniques

Patching & Updating

Ninitehttps://ninite.com/

10/23/2019 Ron Woerner

Page 34: Cybersecurity Tips, Tools, and Techniques

Patching & Updating

SNIPE-IThttps://snipeitapp.com/

BatchPatch* https://batchpatch.com/

Chocolatey *https://chocolatey.org/

*Trial versions10/23/2019 Ron Woerner

Page 35: Cybersecurity Tips, Tools, and Techniques

Network Evaluation / Troubleshooting

Introduction video

TcpDump

https://www.wireshark.org/

10/23/2019 Ron Woerner

Page 36: Cybersecurity Tips, Tools, and Techniques

Security / Pen Testing Distros

• Kalihttps://www.kali.org/downloads/

• Parrot Security OShttps://www.parrotsec.org/download-security.php

• Tails https://tails.boum.org/

10/23/2019 Ron Woerner

Page 37: Cybersecurity Tips, Tools, and Techniques

Pen Testing Framework

https://www.metasploit.com/

https://www.offensive-security.com/metasploit-unleashed/requirements/10/23/2019 Ron Woerner

Page 38: Cybersecurity Tips, Tools, and Techniques

Social Engineering

• IntelTechniques (OSInt) –https://inteltechniques.com/menu.html

• Spiderfoot – https://www.spiderfoot.net/

• Maltego – https://www.paterva.com/

• Cree.py – Geolocation Information Aggregator, http://www.geocreepy.com/

• Peek You - www.peekyou.com

10/23/2019 Ron Woerner

Page 39: Cybersecurity Tips, Tools, and Techniques

Social Engineering Toolkit (SET)

https://www.trustedsec.com/social-engineer-toolkit-set/10/23/2019 Ron Woerner

Page 40: Cybersecurity Tips, Tools, and Techniques

Security Testing

• Person use

• Scan up to 16 IPs

https://www.tenable.com/products/nessus/nessus-essentials10/23/2019 Ron Woerner

Page 41: Cybersecurity Tips, Tools, and Techniques

Security Testing

http://www.openvas.org/index.html10/23/2019 Ron Woerner

Page 42: Cybersecurity Tips, Tools, and Techniques

Security Testing

• OWASP Zed Attack Proxy (ZAP)

• Portswigger Burp Suite*

• Vega

• Netsparker*

• GuardiCore Infection Monkey*Trial versions

10/23/2019 Ron Woerner

Page 43: Cybersecurity Tips, Tools, and Techniques

Digital Forensics

• SANS SIFT

• The Sleuth Kit(+Autopsy)

• Digital Forensics Framework

• CAINE (Computer Aided INvestigative Environment)

• Access Data FTK

*Trial versions10/23/2019 Ron Woerner

Page 44: Cybersecurity Tips, Tools, and Techniques

Personal Security – Password Vaults

• LastPass

• KeePass

• LogMeOnce

• 1Password

• RoboForm

• Dashlane

10/23/2019 Ron Woerner

Page 45: Cybersecurity Tips, Tools, and Techniques

Personal Security – Encryption

• 7-Zip

• AES Crypt

• Veracrypt

10/23/2019 Ron Woerner

Page 46: Cybersecurity Tips, Tools, and Techniques

Business Continuity Planning

10/23/2019 Ron Woerner

DHS – Ready.Gov

Page 47: Cybersecurity Tips, Tools, and Techniques

https://www.ready.gov/business-continuity-planning-suite

10/23/2019 Ron Woerner

Page 48: Cybersecurity Tips, Tools, and Techniques

Going for Help• FBI Internet Crimes Complaint Center (IC3):

https://www.ic3.gov/default.aspx

• The Cybersecurity and Infrastructure Security Agency (CISA)

• US-CERT Incident Reporting System: https://www.us-cert.gov/forms/report

• State Patrol and Local Police

• Your bank

Page 50: Cybersecurity Tips, Tools, and Techniques

Security Books

https://cybercanon.paloaltonetworks.com/

10/23/2019 Ron Woerner

Page 51: Cybersecurity Tips, Tools, and Techniques

Help add to the list

What Else?

10/23/2019 Ron Woerner

Page 52: Cybersecurity Tips, Tools, and Techniques

“Apply Slide”

• Immediate: • Pick 1 or 2 tools / techniques • Play / Try it out / Experiment

• Next 4-6 Weeks (rinse and repeat in 3 & 6 mos):• Review this slide deck• Pick more tools (3-5)• Experiment with tools in a virtual environment• Review the awareness websites

10/23/2019 Ron Woerner

Page 53: Cybersecurity Tips, Tools, and Techniques

Cybersecurity Tips, Tools, & Techniques

Ron Woerner, CISSP, CISM

ron.woerner @ rwxsecurity.com

Twitter: @ronw123

10/23/2019 Ron Woerner