Skip to main content

Network and Systems Hardening

Network hardening Make sure your firewall is correctly configured, that all rules are periodically reviewed, that remote access points and users are secure, that any open network ports are blocked, that extraneous protocols and services are disabled and removed, that access lists are in place, and that network data is encrypted. Systems Hardening Audit your current systems: Conduct a thorough audit of your current technologies (you can use). To identify system weaknesses and order remedies, use security auditing techniques like configuration management, vulnerability scanning, and penetration testing. Utilize industry standards from NIST, Microsoft, CIS, DISA, and other sources to conduct system hardening assessments against resources. Create a strategy for systems hardening: Not every system needs to be hardened at once. Instead, develop a strategy and plan based on the risks found in your IT ecosystem, and then utilize a staged approach to fix the most serious issues. Patch ...

Rootkits

 Rootkits

A rootkit is a collection of software designed to provide privileged access to a remote user over the target system. Mostly, Rootkits are the collection of malicious software deployed after an attack, when the attacker has the administrative access to the target system to maintain its privileged access for future. It creates a backdoor for an attacker; Rootkits often mask the existence of its software which helps to avoid detection.

Types of Rootkits

1.Application Level Rootkits

2.Application Level Rootkits perform manipulation of standard

3.application files, modification of the behavior of the current application with an injection of codes.

Kernel-Level Rootkits

The kernel is the core of an OS. Kernel-Level Rootkits add additional codes (malicious), replace the section of codes of original Operating system kernel.

Hardware / Firmware Level Rootkits

Type of Rootkits that hides in hardware such as hard drive, network interface card, system BIOS, which are not inspected for integrity. These rootkits are built into a chipset for recovering stolen computers, delete data, or render them useless. Additionally, Rootkits has privacy and security concerns of undetectable spying.

Hypervisor Level Rootkits

Hypervisor Level Rootkits exploits hardware features like AMD-V (Hardware-assisted virtualization technologies) or Intel VT, which hosts the target OS as a virtual machine.

Boot Loader Level Rootkits

Bootloader Level Rootkits (Bootkits) replaces the legitimate boot loader with the malicious one which enables the Bootkits to be activated before an OS run. Bootkits are a serious threat to the system security because they can infect startup codes such as Master Boot Record (MBR), Volume Boot Record (VBR) or boot sector. It can be used to attack full disk encryption systems, hack encryption keys and passwords.

Rootkit Tools

Avatar

Necurs

Azazel

ZeroAccess


Comments

Popular posts from this blog

Concepts, Types, and Phases of Hacking

 Concepts, Types, and Phases of Hacking A hacker is someone who is intelligent enough to use various tools and techniques to gain unauthorized access to a system in order to steal information such as usernames, passwords, financial information, credit card information, business data, and personal information. Hackers are very skilled, capable of creating software, and exploring both hardware and software. Their motives can range from paying people to hack computers to engaging in unlawful activity for enjoyment. Black Hats Hacker with amazing talents who engages in malicious and destructive acts, often known as crackers White hats Security Analyst or individuals with hacking skills using them for defensive purpose  Gray Hats Gray Hats are those work for both offensively and defensively Suicide hackers Suicide hackers are those who aim for destruction without worrying about punishment. Script Kiddies Unskilled hackers, hacking and compromising systems using tools are scrip...

Application scanners

 HCLTech AppScan Standard is a Dynamic Analysis testing tool designed for security experts and pen-testers to use when performing security tests on web applications and web services. It runs automatic scans that explore and test web applications, and includes one of the most powerful scanning engines in the world. WebInspect is an automated dynamic testing solution that provides comprehensive vulnerability detection. Fortify WebInspect Benefits Vulnerabilities are discovered faster and earlier. Automation and agent technology can help you save time. Users can utilize crawl web technologies and modern frameworks. ScanCentral DAST helps you manage enterprise app security risk.

Different type of attacks

 Different type of attacks 1 . Operating System Attacks - Due to Bug and Unpatched 2 . Misconfiguration attack 3 . Application type attack Virtual Machines 1. VMware 2. VirtualBox 3. Parallel Desktop 4. MobaLive CD 5. VMLite XP Mode 6. VirtualBox 7. Parallel Workstation