Cyber Security Tools L.notes 1
Cyber Security Tools L.notes 1
BY
February, 2024
Module One
1.0 INTRODUCTION
The invention of computing devices has brought higher attainment in
professional and personal lives. Cyber security techniques is of growing
importance due to increasing reliance on devices such as computer
systems, smart phones, routers, switches e.t.c, which attempts to
safeguard the cyber space of online users or organization.
Confidentiality: provide protection mechanisms for the data while it is stored and transferred over networks
between computers.
Integrity: keeping data away from those who should not have it and making sure that those who should
have it can get it are fairly basic ways to maintain the integrity of the data
Nonrepudiation: Allows the formation of binding contracts with or without any paper being printed for written
signatures (digital signatures)
TYPES OF CYBER SECURITY ATTACKS
A). Denial of Service (DoS)
• DoS attacks has become increasingly popular among attackers due to the
growing number of IoT devices with insufficient security. These attacks is
quite common in which overload is used to flood the resource with
illegitimate requests for service thereby slowing or crashing the network.
• The sole objectives of DoS attack is to overwhelm the network with invalid
requests which causes bandwidth wastage that result to lack of access to
service by legitimate users . DDoS arises when a single target is attacked
by multiple sources simultaneously which makes it difficult to identify and
avoid. DDoS attacks occurs in variety of shapes and sizes, with the same
purpose
B). Man in the Middle (MiTM)
• A type of MiTM attacks is Spoofing and impersonation. A MiTM attacker
can pretend to be in a particular location while interacting with a
particular node . This attacker can establish a connection with the server
through hypertext transfer protocol secure (HTTPS) while connecting
with the victim over hypertext transfer protocol (HTTP) through secure
sockets layer (SSL) stripping.
C). Malware
• Malware (malicious software) application or script is intentionally
designed to cause damage to networks ,computers, or data. An attacker
can employ software patches to perform criminal operations and install
malware. It comprises of worms, Trojan horses , spyware, rootkits,
viruses, and other forms of deceptive advertising. These attackers are
dangerous because they are well trained, state sponsored, and well
funded.
D). Botnet Attacks
• Botnet attacks occurs when group of infected devices connects to the
internet to engage in criminal and illegal activities together. The affected
computers are controlled remotely by one or more malicious actors.
F. Browser Attacks
• This attack browser-based network attacks encourages the transfer of
malware through websites but it can be avoided through regular update
of the browsers
G). Backdoor Attacks
• Back door attack occurs when an attacker gains access to a website
through a vulnerable entry point. In distributed attacks, the surrounding
network’s infrastructure is affected but the specific server is not attacked.
• The open source software tools may be free while analyzing FOSS but it’s
subject to source licensing constraints, and the free software tools might
be free under closed source. The open source cybersecurity tools having
thousands of security capabilities both defensive and offensively.
• Some of the significant security tools are being helpful to secure the
systems and networks. The following are some of the open source
security tools that have indispensable categorization due to the fact they
are very productive, well sustain and it is easy to get start.
i). OpenVPN
• OpenVPN is freely available open source commercial software. It secures
our data communications and produce adaptable Virtual Private Network
(VPN) solutions . It provide solutions to the Cross-platform VPN clients
and to VPN server and extend flexibility to site-to-cloud, users-to-cloud, site
-to-site, devices-to-cloud, site-to-cloud and other network arrangements.
ii). ModSecurity
• ModSecurity is an open source application firewall. Sometimes it is
called as ModSec. ModSecurity toolkit mainly useful in real-event web
application logging, monitoring, and access control. ModSecurity acts as
a module for Apache web servers and checks all HTTP requests that
reach Apache and Nginx- supplementary web server of Apache.
iii). SafePad
• SafePad is an encrypted text editor. It mainly uses AES (Advanced
Encryption Standard) encryption algorithm. SafePad is ideal editor for
protecting the passwords, banking and card details and also providing
secrets in big business.
B. Networking and Security Auditing
i). NMAP
• NMAP stands for Network Mapper. It is a utility that provides information
about the available ports (connection points) on the network. It has
excellent OS and server software version detection. This tool analyzes IP
packets of systems to gain information about the services running on the
system, operating system, presence and type of firewalls, etc. It also
enables monitoring of host uptime, map out possible areas of attacks on
the network and service and takes possible actions.
Advantages of Nmap:
Comprehensive Network Scanning:
• Nmap is a comprehensive network scanner that can be used to discover
hosts on a network, identify open ports, and determine which services
are running on those ports. It provides a detailed picture of a network's
structure and the devices connected to it.
Platform Independence:
• Nmap is platform-independent and supports various operating systems
like Windows, Linux, macOS, and more.
• This active community ensures that Nmap remains up-to-date with the
latest advancements in networking and security.
Disadvantages of Nmap:
Intrusive Scanning:
• While Nmap is an excellent network mapping tool, its scanning techniques can be
considered intrusive, especially on production networks. Certain scanning methods may
trigger security alerts or cause disruptions on the network being scanned.
• Users who prefer a visual interface might find the GUI version lacking certain
functionalities.
False Positives:
• In some cases, Nmap may produce false positives, incorrectly
identifying open ports or services due to firewalls, NAT devices, or other
network configurations. This can lead to potentially misleading results if
not interpreted correctly.
iii). HPing
• HPing is a “TCP/IP packet assembler/analyzer and furthermore a
commandline oriented. It supports protocol like TCP, UDP, ICMP and
RAW-IP. It has the mode called “traceroute” mode, which have the
“capacity to send records between a secured channel, and numerous
different highlights”.
iv). Wireshark
• This is an open-source tool used to analyse network protocols, asses
network security weakness by continuous capturing and analysing packets.
• It is compatible across different OS, data are captured in real-time, multiple
networks and various output formats are supported.
• Wireshark Features
i). Live capture and offline analysis
ii). Read and write in a variety of different capture file formats, including
tcpdump (libpcap), Pcap NG, Catapult DCT2000, Cisco Secure IDS iplog,
Microsoft Network Monitor, and many others
iii). Rich VoIP analysis
iv). Export output to XML, PostScript, CSV, or plain text
Pros
• Affordable Price: Many users appreciate the low cost of Wireshark, as it
provides powerful network analysis capabilities without the need for
expensive software. Several reviewers have stated that Wireshark offers
a good value for its price.
• Packet Analysis Capabilities: The ability to capture, log, and analyze
packet data is highly valued by users. Many reviewers have mentioned
that this feature allows for detailed troubleshooting and monitoring of
network traffic in their feedback on Wireshark.
• Steep Learning Curve: The software has a steep learning curve, with new
users finding it overwhelming to see all the columns and colors. This can
make it challenging for them to navigate and understand the software.
• Snort can be functioned and deployed for both personal and official
purposes. Sniffer can be configured in three modes “Sniffer mode, Packet
logger mode, Network Intrusion Detection System mode”. This tool is
developed by Cisco Systems.
• Snort works by using a set of rules to find packets that match against
malicious network activity and generate alerts for users. In addition to its
applications as a full-blown network intrusion prevention system, Snort
can also be used as a packet sniffer like tcpdump or as a packet logger.
• Snort Features
Compatible with all types of operating systems and hardware
Perform real-time traffic analysis
Detect a variety of attacks and probes including buffer overflows, stealth
port scans, CGI attacks, operating system fingerprinting attempts, and
more
vii). Nagios
• To monitor and ensure the integrity of your organization’s infrastructure,
the Nagios IT management software suite is a flexible, customizable,
and intuitive option.
• Promising to help you detect and resolve any IT infrastructure problems
before they affect business processes, the Nagios product line includes:
• Nagios XI :- IT infrastructure monitoring software;
• Nagios Log Server:- for enterprise-class log monitoring;
• It stores the file integrity checking databases, the logs, events and
system auditing entries. OSSEC Agent is a small program or collection of
programs installed on the systems which are need to be monitor.
• The agent will collect information in real time and forward it to the
manager for analysis and correlation.
• Analyse logs from multiple devices and formats. The devices can be
Agents, Syslog devices, Routers, Switches, Printers, etc.,
• An active response system. This means OSSEC will not only monitor, but
also respond to threats (ex. black list naughty IP addresses)
Some of the disadvantages of OSSEC:
iii). Metasploit
• Metasploit is a powerful and famous open-source penetration testers or
hackers (in all forms) use for exploiting, listening, executing shell code,
etc. It is compatible with a range of different system, it also offers the
capability to uncover the slightest weakness or emerging weakness.
D). Internet Security
• Typically, Internet security bounds with browser security, where secured
data is invaded through the Web form, and the Internet protocol sends
the overall authentication and protection to the data. Internet security is a
boundless concern covering all the term security for transactions made
over the Internet.
i). CheckShortURL
• CheckShortURL is the cybersecurity tool used for checking shortened
URLs . It supports almost all URL shortening services such as : “t.co,
goo.gl, bit.ly, amzn.to, tinyurl.com, ow.ly, youtu.be and many others .
ii). NoScript
• NoScript tool prevents a victim from cross-site scripting and other types
of script web attacks on Firefox and other Mozilla-based browsers. It
additionally gives the most powerful anti-XSS and hostile to Click jacking
assurance ever accessible in a program (browser).
iii). SiteLock
• SiteLock offers comprehensive website security to guard your site against
malicious cyber threats, including web applications and your site code.
• Depending on which paid plan you subscribe to , each offers a 30-day free
trial. You can use SiteLock to conduct daily scans of your website for
malware, viruses, and other security threats before taking advantage of
the platform’s automatic malware removal feature.
• SiteLock Features
i). Vulnerability management
ii). Website scanning and backup
iii). Content delivery network enables high traffic with zero lag time
iv). Web application security
v). Supports a variety of CMS environments including WordPress,
Drupal, Magento, WooCommerce, and more.
iv). SolarWinds Security Event Manager
• SolarWinds offers an exhaustive number of cybersecurity solutions to
tackle a wide range of functions including network traffic security and
analysis, database management, systems management, IT security and
IT service management, application management, and much more.
i). SPAMfighter
• SPAMfilter is an email security tool for filtering emails in order to identify
and stop spams.
ii). Spamihilator
• Spamihilator a security tool that determines spam emails using filters, a
learning algorithm, and a probability calculator for email blockage.
iii). SpamBully
• SpamBully is a tool that learn and block spam using intelligent learning. It
allows for spam reporting to fight back at spammers , auto delete options,
etc.
ii). Ophcrack
• Ophcrack (GPL Licensed) is a graphical user interface tool that works by
utilizing rainbow tables for password cracking in Windows OS. It is useful
for recovering forgotten Windows passwords.