INE Training Notes - by syselement
🏠 Home BlogGitHub📚 Buy Me a Book
  • INE Training Notes
  • Courses
    • eJPT - PTSv2
      • 📒Penetration Testing Prerequisites
        • Introduction
        • Networking
        • Web Applications
      • 📒1. Assessment Methodologies & Auditing
        • Information Gathering
        • Footprinting & Scanning
        • Enumeration
          • 🔬SMB Enum
          • 🔬FTP Enum
          • 🔬SSH Enum
          • 🔬HTTP Enum
          • 🔬MYSQL Enum
          • 🔬SMTP Enum
        • Vulnerability Assessment
        • Auditing Fundamentals
      • 📒2. Host & Network Penetration Testing
        • System/Host Based Attacks
          • 🪟Windows Attacks
            • 🔬IIS - WebDAV
            • 🔬SMB - PsExec
            • 🔬RDP
            • 🔬WinRM
            • 🔬Win Kernel Privesc
            • 🔬UAC Bypass
            • 🔬Access Token
            • 🔬Alternate Data Stream
            • 🔬Credentials Dumping
          • 🐧Linux Attacks
            • 🔬Bash
            • 🔬FTP
            • 🔬SSH
            • 🔬SAMBA
            • 🔬Cron Jobs
            • 🔬SUID
            • 🔬Hashes Dumping
        • Network Based Attacks
          • 🔬Tshark, ARP, WiFi
        • The Metasploit Framework (MSF)
          • 🔬HFS - MSF Exploit
          • 🔬Tomcat - MSF Exploit
          • 🔬FTP - MSF Exploit
          • 🔬Samba - MSF Exploit
          • 🔬SSH - MSF Exploit
          • 🔬SMTP - MSF Exploit
          • 🔬Meterpreter - MSF
          • 🔬Win Post Exploitation - MSF
          • 🔬Linux Post Exploitation - MSF
        • Exploitation
          • 🔬Fixing Exploits - HFS
          • 🔬Win Workflow Platform - MSF
          • 🔬Win Black Box Pentest
          • 🔬Linux Black Box Pentest
        • Post-Exploitation
          • 🔬Windows Post-Exploitation
          • 🔬Windows Privilege Escalation
          • 🔬Windows Persistence
          • 🔬Linux Post-Exploitation
          • 🔬Linux Privilege Escalation
          • 🔬Linux Persistence
          • 🔬Cracking Hashes
          • 🔬Pivoting
        • Social Engineering
      • 📒3. Web Application Penetration Testing
        • Intro to Web App Pentesting
          • 🔬HTTP Enumeration
          • 🔬Web App Scanning
          • 🔬Web App Attacks
      • 🔬Exam Preparation - Labs
        • PTSv1 Prerequisites Labs
          • 🔬HTTP(S) Traffic Sniffing
          • 🔬Find the Secret Server
          • 🔬Data Exfiltration
          • 🔬Burp Suite Basics - Directory Enumeration
        • PTSv2 Practice Labs
      • 🌐eJPT References
      • 📜eJPT Cheat Sheet
    • ICCA
      • 📒1. Cloud Foundations
      • 📒2. Cloud Management Concepts
      • 📒3. Cloud Identity, Security, and Compliance
      • 🌐Icca References
    • eMAPT
      • 📒Android
      • 📒iOS
      • 🌐eMAPT References
  • 🏠syselement's Blog Home
Powered by GitBook
On this page
  • Cybersecurity Basics
  • CIA Triad
  • Defense in Depth
  • Compliance
  • Frameworks and Maturity
  • Auditing
  • SCAP
  • Asset Management
  • nmap
  • Nessus

Was this helpful?

Edit on GitHub
  1. Courses
  2. eJPT - PTSv2
  3. 📒1. Assessment Methodologies & Auditing

Auditing Fundamentals

⚡ Prerequisites

  • Basic networks concepts

📕 Learning Objectives

  • Describe cyber security and explain cyber maturity

  • Identify common frameworks and governing regulations

  • Perform network auditing

❗ Authorization is required to conduct systems auditing. ❗

Cybersecurity Basics

🗒️ Cybersecurity, or Information Technology Security, is the process of protecting systems, networks, programs, devices and data by preventing, detecting and responding to digital attacks. It aims to lower the risk of cyberattack and protect against the unauthorized and improper use of the involved technology.

Protected information can be:

  • PII (Personally Identifiable Information)

  • Healthcare Information

  • Financial Data

  • Intellectual Property

  • Business Secrets

  • Business Operations

Data must be secured from:

  • Criminals

  • Competitors

  • Insider Threats

  • Malicious Actors

CIA Triad

🗒️ The CIA Triad (Confidentiality, Integrity and Availability) is a guiding model used to describe information security, also useful for managing the products and data of research.

Policies and security controls that reduce threats to these three vital components are a part of a comprehensive information security plan and are balanced to meet business needs.

CIA Triad
Description

Confidentiality

Protecting information from unauthorized access, allowing only authorized users to access certain data

Integrity

Data is trustworthy, complete, accurate and have not been accidentally altered or modified by an unauthorized user. Data can be retrieved in the future without changes

Availability

Data is accessible when needed

Defense in Depth

🗒️ The Defense-in-Depth is a strategy that uses multiple layers of security protection and helps reducing vulnerabilities, containing threats and mitigating risks.

Depending on what and how an organization need to secure, the strategy have to be shaped, considering a risk management plan.

🗒️ Risk Management is the process of identifying, assessing and controlling financial, legal, strategic and security risks to an organization’s capital and earnings. It plays the ultimate factor in an organization.

Compliance

🗒️ Cybersecurity Compliance involves meeting various controls to protect the confidentiality, integrity, and availability of data.

Compliance requirements (usually established by a regulatory authority, law or industry group) typically involve using an array of specific organizational processes and technologies to safeguard data. Controls come from a variety of Cybersecurity frameworks and regulations, such as:

    • mandated by card brands, created to increase controls around cardholder data

    • reduce card fraud

    • Data protection and privacy law in the EU (European Union) and EEA (European Economic Area)

    • United States regulations for the use and disclosure of PHI (Protected Health Information)

    • Administrative, physical, technical safeguards

    • enhance privacy rights and consumer protection for California (USA) residents

Frameworks and Maturity

    • Identify, Protect, Detect, Respond, Recover - best practices

    • Applies to any organization

    • Information security management systems - Requirements

    • business and generic IT management focused

    • 18 CIS Controls for mitigate the most known cyber attacks

    • Simplifies compliance by allowing self-assessment for some requirements

    • Applies priorities for protecting Department of Defense (DoD) information

    • Reinforces cooperation between the DoD and industry in addressing evolving cyber threats

Auditing

🗒️ A security Audit is an extensive evaluation of an organization’s information system, an assessment that measures the information system’s security against an audit checklist of industry best practices, governmental legislation or externally defined standards.

An audit is necessary for a compliance plan.

  • Interviews on security awareness, training and practices - CISO, system administrators, employees

  • Review Paperworks - how records, logs are kept

  • Assessments - using automated tools to find compliance software and devices, vulnerability assessments

  • As an auditor or pentester, good notes are useful for the information gathering and the final report

  • Mind maps - useful and understandable by the customer

  • Reports - an important part that has value to a company as a result of a penetration test

SCAP

Asset Management

  • General audit internal devices with an internal network scan using nmap tool to find active services and open ports

nmap 192.168.50.0/24

nmap -A 192.168.50.1,5,10
# Aggressive scan (Syn, Service, O.S, Default Scripts Scans) on specific IPs

nessus is a network vulnerability scanning tool, hosted locally and used for Vulnerability Assessment.

    • Limited to 16 IPs for V.A.

    • Build in insights with latest vulnerabilities

    • No usage time limit

    • Report export as PDF, HTML, CSV formats


PreviousVulnerability AssessmentNext📒2. Host & Network Penetration Testing

Last updated 2 years ago

Was this helpful?

(Payment Card Industry Data Security Standard )

(General Data Protection Regulation)

(Health Insurance Portability and Accountability Act)

(California Consumer Privacy Act.)

📖

🗒️ are sets of controls that represents a fully functional cybersecurity program when met.

(National Institute of Standards and Technology)

disegned to apply to U.S. Federal Government agencies.

(International Organization for Standardization and the International Electrotechnical Commission)

- Code of practice for information security controls

(Center for Information Security)

(Cybersecurity Maturity Model Certification)

(Australian Signals Directorate)

🗒️ The (Security Content Automation Protocol) is a specification for expressing and manipulating security data in standardized ways. It uses specific standards to help organizations automate continuous monitoring, vulnerability management and security policy compliance evaluation reporting.

DISA is a GUI java based program used to open content and generate checklists for managing the security settings on a system or network.

Nessus Essentials is the free version of the V.A. tool by .

PCI DSS
GDPR
HIPAA
CPPA
Cybersecurity Compliance: A Comprehensive Guide - Celerium
Cybersecurity Frameworks
NIST Cybersecurity Framework
NIST 800-53
ISO/IEC 27001
ISO/IEC 27002
COBIT by ISACA
CIS
CMCC
ASD Essential 8
SCAP
STIG Viewer
nmap
Nessus
Tenable
Nessus Documentation
InfoSec CIA Triad
STIG Viewer
Nessus