Paul Sutton

CyberSecurity

CyberSecurity part 28

Series ending

After 27 parts, this series is now coming to an end.

The BASH series is going to be given a new home. In order to facilitate this, it is being re-written and will form part of a larger project.

As this is now taking up my time, it makes sense to end the and focus on the new format that it will be presented in. I am also getting some help from a few very capable young hackers with this.

Nevertheless, the new format will look better and be more useful than a video and a list of commands that are just a summary of the video.

In other news, the Tuxiversity forum and website (below) are also going to be overhauled.

If you wish to ask questions about the current series, I am available via Internet Relay Chat (zleap), as are other members of the team behind this project.

To chat on IRC, please click the link below, enter a new nickname and press start. You should be then taken to the chatroom.

Links

Tags

#CyberSecurity,#Series,#Ending,#Announcement,#IRC,#tuxiversity

CyberSecurity part 27

Build Your Own Linux

This looks like a really useful tutorial for anyone wanting to build their own GNU/Linux system from scratch. So this also ties in to this series as being able to build robust, secure systems is essential. A good way to do this is build your own.

Discuss

Tags

#CyberSecurity,#Data,#BuildYourOwnLinux

CyberSecurity part 26 Supplemental

Just a quick post to update the article index to include latest article(s).

CyberSecurity part 3 – BASH Basics 1 CyberSecurity part 4 – BASH Basics 2 CyberSecurity part 5 – BASH Basics 3 CyberSecurity part 6 – BASH Basics 4 CyberSecurity part 7 – BASH Basics 5 CyberSecurity part 8 – BASH Basics 6 CyberSecurity part 9 – BASH Basics 7 CyberSecurity part 10 – BASH Basics 8 CyberSecurity part 10-1 CyberSecurity part 11 – Nano Editor CyberSecurity part 12 – Shell Scripting CyberSecurity part 13 – Sed,Grep & Cron CyberSecurity part 14 – System D Bsics CyberSecurity part 15 – Networking Basics CyberSecurity part 16– Day off- A few useful links CyberSecurity part 17 – OpenSSh CyberSecurity part 18 – Git & Github CyberSecurity part 19 – Virtual Machines CyberSecurity part 20 – Computer Misuse Act CyberSecurity part 21 – Python Intro CyberSecurity part 22 – Pen testing tools CyberSecurity part 23 – CyberSecurity Courses CyberSecurity part 24 – Functional Programming in Coq CyberSecurity-part-25 – Open Source vs Free Software CyberSecurity-part-26 – Self hosting CyberSecurity-part-27 – Build your own Linux

Tags

#CyberSecurity,#PostIndex

CyberSecurity part 26

A guide to self hosting

AndewYu has produced a really useful guide, detailing how you can set up your own website and host this yourself, from obtaining a domain, setting up DNS and obtaining a SSL Certificate,

There is a lot of really useful information here, and it ties in nicely with this series of posts and perhaps learning about writing websites with HTML / CSS for example.

Discuss

Tags

#CyberSecurity,#SelfHosting#Hosting

CyberSecurity part 25

Open Source vs Free Software

There seems to be confusion around the terms Free software and Open Source Software.

To briefly clarify this.

The primary difference is philosophy – The free software movement says we're here doing all this because proprietary software is unethical. Wrong. Unjust.

The open source movement says we're here doing all of this because we can get technically better software.

Free software

Free software, does not simply mean the software is free as in cost, it refers to Free as in Freedom and a free software license such as the GPL [2] grants a user 4 freedoms.

  • Freedom to use for any purpose
  • Freedom to study the software
  • Freedom to modify
  • Freedom to copy and share the software with others

The freesoftware movement is also therefore about philosophy.

References

1 OpenSource.org 2 GNU.org

Discuss

#CyberSecurity,#FreeSoftware,#OpenSource

CyberSecurity part 24

Functional Programming in Coq

Staying on the theme of programming and cybersecurity, this course is about Functional Programming in Coq and was mentioned on the Libreplanet discuss mailing list. It may be useful generally as a way to learn skills that can be applied to other languages or just generally.

#CyberSecurity,#Coding,#Functional,#Programming,#COQ

CyberSecurity part 23

Courses and further reading:-

courses Courses related to Kali Linux

Learning how to use these and the associated tools is way beyond the scope of what I am doing here. I would therefore suggest you look in to other learning options.

There are many other providers, not sure about any in Torbay, we do seem to be in the dark ages down here. But Tech Learning Collective do several courses.

Tech Learning Collective

I have listed some providers below, and would hope that the forum may, eventually be a good source of information too.

Links

Cyber Security

Tags

#CyberSecurity,#Courses.

CyberSecurity part 22

Penetration testing tools

I am now sharing a link to some information that I found on the 9 best tools for penetration (or pen) testing.

9 best pentesting tools

  • Nmap
  • Wireshark
  • Gobuster
  • Amass
  • John the Ripper
  • Medusa
  • Ncrack
  • Burp Suite
  • Metasploit

This list is from February 2022.

Links

Tags

#CyberSecurity,#PenTestingTools

CyberSecurity part 21

Python, is a very useful and powerful programming language which can be used for a wide variety of tasks, including those relating networking and cybersecurity, pen testing etc. Therefore having a good knowledge will be very beneficial going forward. To this end there are a few links below.

Python is also pre-installed on the Raspberry Pi, however you can also experiment via Replit. FreeCodeCamp have a number of python courses, one or two are related to cybersecurity. Vfsync which we are using as a virtual GNU / Linux machine, comes with Python 2.7 and Python 3.8.3

localhost:~$ python
Python 2.7.18 (default, Apr 21 2020, 01:56:54)
[GCC 9.3.0] on linux2
Type "help", "copyright", "credits" or "license" for more information.
>>>

Links

Tags

#CyberSecurity,#Python

CyberSecurity part 20

Over the past 20 days, we have covered a wide range of topics. Given that we are heading towards discussing cyber security, then it is time we started to look at the legal framework behind this.

The United Kingdom has a piece of legislation called the Computer Misuse act, that was introduced in 1990. There is a video below about this.

I am sharing so that it is clear that what you learn and undertake with systems such as Kali Linux has to be within the law.

Links

Tags

#CyberSecurity,#ComputerMisuseAct