jym.sg

HomeBadges

A Systematic Approach to Cyber Deception (Part 3 of 4)

Mar 23, 20215 min read

Recap Part 2 of this series touched on planning & measuring success of a Cyber Deception campaign. It also covered some "estimations" of Threat Actors based on Operational Security abilities. This part will illustrate more examples of simulation vs d...

A Systematic Approach to Cyber Deception (Part 2 of 4)

Mar 11, 20214 min read

Recap Part 1 introduced 3 Phases of Cyber Deception Campaign. We briefly highlighted 4 considerations related to Industrial networks: (1) Safety, (2) Availability, (3) Realism, & depending on our strategic goals, (4) Secrecy that we should be mindfu...

A Systematic Approach to Cyber Deception (Part 1 of 4)

Mar 9, 20213 min read

Introduction This series is about Knowing ourselves, our enemy & plan in a way to conjure "grounds" & "weather" to our advantage. This approach is adapted from a joint-paper by Mohammed H. Almeshekah and Eugene H. Spafford, published by Springer ...

Golang Notes

Feb 27, 20211 min read

General Useful link(s) that I am going to add here. Getting Started https://golangvedu.wordpress.com/2017/02/01/a-one-pager-tutorial-of-go-part-1/ Interesting Workarounds/Hacks Scripting with .go file: https://gist.github.com/posener/73ffd326d88483df...

Goodbye SSH Brute-force!

Oct 16, 20201 min read

TL;DR Sign-up https://zerotier.com, free for the 1st 50 devices! Create a Zerotier private network Join private network, both ssh-server & client Configure sshd to listen with private IP Goodbye ssh-brute-force! Why? Reduce Attack-Surface Wh...

© 2021 jym.sg

PrivacyTerms
Proudly part of