American-Canadian author William Gibson coined the term "cyberspace" in 1982 in a story in Omni magazine and in his 1984 science fiction novel Neuromancer
Some key ports to remember
Port number Description 20 TCP FTP data transfer 21 TCP FTP Control 22 TCP/UDP ssh 23 TCP telnet 25 TCP smtp 53 DNS 67 used by DHCP servers to listen for incoming DHCP client requests 68 used by the DHCP client to listen for messages from the DHCP server 80 TCP/UDP Hypertext Transfer Protocol(http) 110 TCP Post Office Protocol(POP3) 137 UDP NetBIOS name service used for name registration and resolution 138 TCP/UDP NetBIOS Datagram Service 143 TCP Internet Message Access Protocol(IMAP) 389 LDAP 443 TCP Hypertext Transfer Protocol over TLS/SSL(https) 3389 TCP/UDP Microsoft Terminal Server(RDP)
Port number | Description | |
20 | TCP | FTP data transfer |
21 | TCP | FTP Control |
22 | TCP/UDP | ssh |
23 | TCP | telnet |
25 | TCP | smtp |
53 | DNS | |
67 | used by DHCP servers to listen for incoming DHCP client requests | |
68 | used by the DHCP client to listen for messages from the DHCP server | |
80 | TCP/UDP | Hypertext Transfer Protocol(http) |
110 | TCP | Post Office Protocol(POP3) |
137 | UDP | NetBIOS name service used for name registration and resolution |
138 | TCP/UDP | NetBIOS Datagram Service |
143 | TCP | Internet Message Access Protocol(IMAP) |
389 | LDAP | |
443 | TCP | Hypertext Transfer Protocol over TLS/SSL(https) |
3389 | TCP/UDP | Microsoft Terminal Server(RDP) |
Port numbers (specifically TCP ports):
A TCP port is an unsigned value and a total of 65,536 (0 to 65,535) ports will be available in a Server.
Port numbers are assigned in various ways, based on three ranges:
- System Ports/Well-known Ports (0-1023),
- User/Registered Ports (1024-49151), and
- Dynamic and/or Private Ports and/or Ephemeral (49152-65535);
the different uses of these ranges is described in [RFC6335].
System Ports are assigned by IETF process for standards-track protocols, as per [RFC6335].
User Ports are assigned by IANA using the "Expert Review" process, as per [RFC6335].
Dynamic Ports are not assigned.
Jargon in Cybersecurity
In Security Parlance, below 4 terms refers to a situation as explained against them
False Positive: This is when benign or non-malicious event is incorrectly flagged as a threat.
False Negative: This is when malicious traffic is mistakenly identified as benign and allowed through.
True Positive: This is when malicious traffic is correctly identified and blocked.
True Negative: This is when benign traffic is correctly identified and allowed.
Principle of Least Privilege (aka Principle of Maximum Security)
IP Addresses
IP addresses are broadly categorized into two types
- IP v4
- In IP v4, - a 32 bit IP address
- format of IP address will be like A.B.C.D and is a numeric IP address
- these are again categorized into public and private IP addresses
- Range of private IP addresses
- Class A - 10.0.0.0 to 10.255.255.255
- Class B - 172.16.0.0 to 172.31.255.255
- Class C - 192.168.0.0 to 192.168.255.255
- IP v6
- In IP v6, - a 128 bit IP address
- an alpha numeric IP address
HTTP Status Codes
HTTP status codes are separated into 5 different classes/categories.
Each category will give you info as to what the response was and response can be understood basing on the "First digit" of the status code
Below is HTTP status codes.
1xx - Informational: Server has received the request and is continuing the process
2xx - Successful: Request was successful and the browser has received the expected information
3xx - Redirection: Request been redirected and the completion of the request requires further action
4xx - Client Error: The website or the page could not be reached, either the page is unavailable or cannot be fulfilled or the request contains bad syntax
5xx - Server Error: While the request appears to be valid, the server could not complete the request
Types of Cyber Attacks
Cyber attacks use distinct methods for compromising or gaining unauthorized access to systems, data, or networks:
- Rainbow Table Attack: Involves using precomputed tables of hash values to reverse-engineer plaintext passwords from their hashed versions, making it faster than brute force attacks.
- Dictionary Attack: Utilizes a list of common words, phrases, or known passwords to guess a user's password by testing each word in the list.
- Brute Force Attack: Systematically tries all possible combinations of characters to guess the correct password.
- Keylogging Attack: Captures the keystrokes a user types, allowing the attacker to obtain passwords and other sensitive information directly.
- Birthday Attack: Exploits the probability of two different inputs producing the same hash value (a hash collision) to find weaknesses in hashing algorithms, based on the birthday paradox.
- Replay Attack: Involves capturing and reusing valid data transmissions, such as login credentials, to gain unauthorized access.
- Phishing Attack: Tricks individuals into providing sensitive information (like passwords or credit card numbers) by pretending to be a legitimate, trustworthy entity, often via email or fake websites.
- Fragment Attack: Involves sending fragmented packets of data that a system must reassemble, potentially causing issues if the system is unable to handle the reassembly properly.
- Spoofing: Involves faking the sender's address (e.g., IP address, email address) to make it appear as if the communication is coming from a trusted source, often used to gain unauthorized access.
- Man-in-the-Middle Attack: The attacker secretly intercepts and possibly alters the communication between two systems, making it seem as though they are directly communicating with each other.
- Oversized Packet Attack: Involves sending data packets that are larger than what the receiving system can process, potentially leading to crashes or system malfunctions.
- Eavesdropping: Involves secretly listening in on or intercepting private communications, often to gather sensitive information like passwords or confidential data.
No comments:
Post a Comment