Recap Part 2 of this series touched on planning & measuring success of a Cyber Deception campaign. It also covered some "estimations" of Threat Actors based on Operational Security abilities. This part will illustrate more examples of simulation vs d...
Recap Part 1 introduced 3 Phases of Cyber Deception Campaign. We briefly highlighted 4 considerations related to Industrial networks: (1) Safety, (2) Availability, (3) Realism, & depending on our strategic goals, (4) Secrecy that we should be mindfu...
Introduction This series is about Knowing ourselves, our enemy & plan in a way to conjure "grounds" & "weather" to our advantage. This approach is adapted from a joint-paper by Mohammed H. Almeshekah and Eugene H. Spafford, published by Springer ...
General Useful link(s) that I am going to add here. Getting Started https://golangvedu.wordpress.com/2017/02/01/a-one-pager-tutorial-of-go-part-1/ Interesting Workarounds/Hacks Scripting with .go file: https://gist.github.com/posener/73ffd326d88483df...
TL;DR Sign-up https://zerotier.com, free for the 1st 50 devices! Create a Zerotier private network Join private network, both ssh-server & client Configure sshd to listen with private IP Goodbye ssh-brute-force! Why? Reduce Attack-Surface Wh...