Uncategorized | All About Testing https://allabouttesting.org Software Testing & Ethical Hacking Fundamentals Wed, 04 Jan 2023 17:01:26 +0000 en-US hourly 1 https://wordpress.org/?v=6.3.2 https://i0.wp.com/allabouttesting.org/wp-content/uploads/2018/02/cropped-logo-favicon.jpg?fit=32%2C32&ssl=1 Uncategorized | All About Testing https://allabouttesting.org 32 32 135190090 Quick Tutorial: Crack zip password using fcrackzip in Kali Linux https://allabouttesting.org/quick-tutorial-crack-zip-password-using-fcrackzip-in-kali-linux/?utm_source=rss&utm_medium=rss&utm_campaign=quick-tutorial-crack-zip-password-using-fcrackzip-in-kali-linux https://allabouttesting.org/quick-tutorial-crack-zip-password-using-fcrackzip-in-kali-linux/#comments Thu, 04 Feb 2021 18:48:48 +0000 https://allabouttesting.org/?p=5489 fcrackzip is a tool used to identify passwords of zip file. This tool works on simple concept of bruteforce. You...

The post Quick Tutorial: Crack zip password using fcrackzip in Kali Linux first appeared on All About Testing.

]]>
fcrackzip is a tool used to identify passwords of zip file. This tool works on simple concept of bruteforce.

You can install fcrackzip by following simple steps:

$ sudo apt-get update
$ sudo apt-get install fcrackzip

Verify installation

$ fcrackzip --help

Example Usage

$ fcrackzip -u -D -p /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt <password-zip-file>

Here

-u : use unzip file to identify passwords

-D : use a dictionary

-p : input password

$ fcrackzip -b -l 5–12 -v -u <password-zip-file>

Here

-b : brute force option

-l : check password with minimum and max length

-v : verbose

Conclusion

This is short tutorial to explain installation and simple usage of fcrackzip on Kali Linux.

The post Quick Tutorial: Crack zip password using fcrackzip in Kali Linux first appeared on All About Testing.

]]>
https://allabouttesting.org/quick-tutorial-crack-zip-password-using-fcrackzip-in-kali-linux/feed/ 1 5489
Hardware Security Module – Cryptographic Solution for Enterprise https://allabouttesting.org/hardware-security-module-cryptographic-solution-for-enterprise/?utm_source=rss&utm_medium=rss&utm_campaign=hardware-security-module-cryptographic-solution-for-enterprise https://allabouttesting.org/hardware-security-module-cryptographic-solution-for-enterprise/#respond Sat, 16 Feb 2019 09:35:26 +0000 https://allabouttesting.org/?p=3652 Hardware Security Module (HSM) is an integral part of the security of enterprises and big businesses. Below 10 points give an...

The post Hardware Security Module – Cryptographic Solution for Enterprise first appeared on All About Testing.

]]>
Hardware Security Module (HSM) is an integral part of the security of enterprises and big businesses. Below 10 points give an insight into HSM, its usage, HSM manufacturers, the features of HSM, the price of HSM, cloud-based HSM, etc.

(1) HSM is a hardware device used to store encryption secret keys of the enterprise securely. This module is not for personal use.

(2) Leading manufacturers of HSM are Utimaco, Thales, Ultra Electronics – CIS, Atalla, Futurex, IBM, and Gemalto.

(3) HSM helps provide three important cryptography processes, i.e., encryption, decryption, and authentication, in a secure and tamper-proof manner.

(4) HSM also helps businesses store sensitive data by using cryptography features such as encrypting, decrypting, signing, etc.

(5) HSM is a perfect solution for key generation, key access control, key transport/key establishment, key storage, and key destruction.

(6) HSM is built on top of a secure operating system free from various computer malware. Thorough security testing is recommended before integrating HSM with other software/hardware modules.

(7) The concept of Strong Key: Random number generation is a must for the strong key. The software-based random key generator cannot generate enough entropy because of the finite state machine constraint. In comparison, the hardware-based module uses physical processes to generate enough entropy and hence generate a random number that satisfies pseudo-random number generator tests.

(8) HSM is quite expensive, which ranges from $1000 to $50,000. Hence, many cloud-based HSM is also available at affordable prices from Google (https://cloud.google.com/hsm/), Amazon (https://aws.amazon.com/cloudhsm/pricing/), Microsoft (https://azure.microsoft.com/en-in/pricing/details/azure-dedicated-hsm/), etc.

(9) HSM has many features, including the tamper-evident mechanism, which ensures maximum security of keys. All the keys have been destroyed automatically if the seal/temper is broken. Other features include a full audit log trail of operations and a backup of encryption keys.

(10) HSM modules can be developed in high-level languages such as C, C++, Java, etc. Vendors preferred level 3 or 4 FIPS 140-2 and common criteria compliance  HSM module to ensure maximum security of the product.

The post Hardware Security Module – Cryptographic Solution for Enterprise first appeared on All About Testing.

]]>
https://allabouttesting.org/hardware-security-module-cryptographic-solution-for-enterprise/feed/ 0 3652
Denial of Service Attack: Brief Tutorial https://allabouttesting.org/denial-of-service-attack-brief-tutorial/?utm_source=rss&utm_medium=rss&utm_campaign=denial-of-service-attack-brief-tutorial https://allabouttesting.org/denial-of-service-attack-brief-tutorial/#respond Thu, 12 Jul 2018 15:07:48 +0000 https://allabouttesting.org/?p=2886 Denial of Service is a type of cyber attack in which an attacker floods the victim with fake or useless...

The post Denial of Service Attack: Brief Tutorial first appeared on All About Testing.

]]>
Denial of Service is a type of cyber attack in which an attacker floods the victim with fake or useless traffic. A website-hosted server’s resources are limited, and these types of attacks create a resource crunch for real or legitimate users. The motivation behind these types of attacks may be political gain, an intention to disrepute a big firm, the ransom for stopping an attack, etc.

Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks

Both attacks consume the resources of the victim and affect the availability. The main difference between DoS and DDoS is the number of IPs or systems involved in an attack.

In a DoS attack, the whole attack originates from a single IP. But in a DDoS attack, an attacker may use different systems with different IPs to attack the victim with useless or fake traffic. An attacker may exploit system weaknesses such as known vulnerabilities to identify systems, compromise them, control them and use them to attack the victim. Compromised systems called botnets are the collection of internet-connected “bots” and all “bots” are controlled by an attacker.

Mirai IoT botnet

One of the famous DDoS attacks is the Mirai IoT botnet (2017). Mirai is malware that infects internet-connected IoT cameras and other similar devices. This malware brute force the company’s default username and password to access and control the IoT devices.  Mainly this malware can be divided into two parts: the malicious code or virus and the command and control center (CnC). The virus is used to infect the system and CnC is used to control all the infected systems to attack the victim. Currently, the source code of this malware is available on the internet for analysis and research purposes.

Types of DoS Attacks

The DDoS attack mainly categorizes into three types:

Volumetric attack: In this type of attack, the attacker flood the victim server with a high volume of fake network packets which is of no use. It exhausts resources of website-hosted infrastructure and makes it unavailable for the legitimate user.

Application layer attack: Low-and-slow attacks and GET/POST floods are examples of application layer attacks. The main purpose of this type of attack is to exhaust the connection limits of the web server.

Protocol attack: SYN floods, fragmented packet attacks, Ping of Death, and Smurf DDoS are some well-known attacks of this type. Here, an attacker sends traffic from a spoof victim’s IP. As a result, the attacker succeeded to flood the victim’s infrastructure by giving a response from an unknown third party.

Tools Used

Many open-source tools are available for DDoS attacks. Refer to this link for the complete list of tools with their download link: Top 15 DDoS Attack Tools

Conclusion

As DDoS attacks increase day by day, the complexity and difficulty of identification of attack also increase. Manufacturers of different DDoS mitigation platforms used artificial intelligence and machine learning to detect and mitigate an attack. Although, no organization is able to claim 100% mitigation of DDoS attacks.

In this article, we have covered what is a DDoS attack, are the major difference between DoS and DDoS, the famous DoS attack Mirai IoT botnet, and a brief of the types of DoS attacks.

The post Denial of Service Attack: Brief Tutorial first appeared on All About Testing.

]]>
https://allabouttesting.org/denial-of-service-attack-brief-tutorial/feed/ 0 2886
Top Tips to Secure Servers and IT Infrastructure [Updated 2023] https://allabouttesting.org/top-tips-to-secure-servers-and-it-infrastructure/?utm_source=rss&utm_medium=rss&utm_campaign=top-tips-to-secure-servers-and-it-infrastructure https://allabouttesting.org/top-tips-to-secure-servers-and-it-infrastructure/#respond Thu, 14 Sep 2017 08:26:00 +0000 https://allabouttesting.org/?p=835 The security of servers is one of the utmost critical tasks for server administrators and network analysts. A lot of...

The post Top Tips to Secure Servers and IT Infrastructure [Updated 2023] first appeared on All About Testing.

]]>
The security of servers is one of the utmost critical tasks for server administrators and network analysts. A lot of tasks need to perform to secure IT infrastructure. I am listing out Top Tips to Secure Servers and IT infrastructures from cyber attacks.

1. Use a secure authentication mechanism
It is a process of verifying the identity of the user or process. To secure infrastructure, always use strong passwords, public key authentication, Implement two-factor authentication, Store your credentials and keys securely for authentication.

2. File system, Files, and directories
Read, modify, or execute commands and scripts for files and directories to the right users and groups. Implement ISO 27001, PCI-DSS standards, which helps the system to secure the file system’s integrity.

3. Operating System and Software
Always use genuine software and install vendor’s security patches at regular time intervals.

4. Training
Ensure regular training to enhance knowledge of IT security-related awareness to IT personnel.

5. Use updated Antivirus
Antivirus is mandatory as it detects and cleans 90% of malware that sits in the system. Also, ensure antivirus logs are generated regularly and monitored by the security team.

6. Use Firewall, IDS, and IPS
Use network devices to secure the perimeter of IT infrastructure. A review also needs to be done regularly for configured policies at regular intervals by network security experts. Follow Best practices recommended by the network device manufacturers. Refer 30 Points Firewall Security Audit Checklist to audit firewall devices.

7. Use static and dynamic analysis to secure code
Application security also plays a crucial role in securing IT systems. Follow the checklist provided by the open web application security project (OWASP) into the Software Development Life Cycle (SDLC) to secure web applications. Use static code analysis tools to find security flaws. Refer 50 Point Checklist for Secure Code Review.

8. Define policies for users & groups
There should be policies in place for individuals and groups. Provide minimum rights to both according to need, delete each of them if they are no longer in use, and enforce role separation, i.e., limit individuals’ privileges to prevent fraud.

9. Services & packages
Uninstall services and software from servers that are not necessary. Implement security best practices provided by services packages providers like Apache, SQL server, etc.

10. Regular Audits & Vulnerability scans
Regular audits play a key role in safe servers from any cyber attack. Vulnerability Assessment(VA) and Penetration Testing(PT) should be done at the defined regular time. Refer 25 Points Virtualization Security Checklist to audit virtualization infrastructure.

11. Backup
Regular backup is a solution to any Ransomware attack (like Wannacry, Petya, etc.) and other corrupt data attacks. If your servers are hacked, it is possible to restore data from the earliest clean backup. This process saves your data in case of any mishappening. Refer

The post Top Tips to Secure Servers and IT Infrastructure [Updated 2023] first appeared on All About Testing.

]]>
https://allabouttesting.org/top-tips-to-secure-servers-and-it-infrastructure/feed/ 0 835