Crafting a design system for a multiplanetary future
Most companies try to stay ahead of the curve when it comes to visual design, but for Planetaria we needed to create a brand that would still inspire us 100 years from now when humanity has spread across our entire solar system.
Foreword
Here is a list of different resources I often reference that you may find valuable.
Windows
CMD
-
netstat -naobnetstat -nao | findstr /c "PORT"You can search for a port faster herenetstat -nao | findstr /v "443"/v means everything except what we specifynetstat -nao | findstr /v "443 80 135 445 623"Search for everything except these ports. Spaces create another search term
-
ipconfig /all -
whoami /all -
arp -a -
route print -
systeminfo -
tracert -
nslookup -
hostname -
tasklist -
sfc /scannow -
icacls -
robocopy -
curl ifconfig.me/ipGet your public IP address. Probably works on linux too.
Reset faulty USB drive
- Launch cmd as admin
diskpartlist diskselect disk #clean- Now reformat it in diskmgmt
Powershell
Copy-ItemMove-ItemInvoke-WebRequestWrite-Output
Linux
Setup SSH Keys
SCP Commands
scp file.txt remote_username@10.10.0.2:/remote/directoryCopy local file to remote systemscp remote_username@10.10.0.2:/remote/file.txt /local/directoryCopy remote File to local system- https://linuxize.com/post/how-to-use-scp-command-to-securely-transfer-files/
SFTP Commands
sftp username@hostnameget -r source_dir dest_dir
Set Time
sudo timedatectl set-timezone America/Chicago- https://linuxize.com/post/how-to-set-or-change-timezone-in-linux/
Change Hostname
sudo vi /etc/hostname/Now reboot
Linux SSH-Server
sudo apt-get install openssh-serversudo systemctl enable sshsudo systemctl start ssh- https://www.cyberciti.biz/faq/ubuntu-linux-install-openssh-server/
Set alias
Temporary Alias
alias ll="ls -alF"
Permanent Alias
- sudo vi .bashrc
alias ll="ls -alF"
General Commands
ll -lhwcuniqcutawksedps -auxhtopzcat LOG.* | grep SEARCH | less -FRSXcLook for something in zeek files in a neat way.date -d @1669764687.779819Turn zeek date into local system time human readablejqThank me later :)
Keyboard Shortcuts
- Tab - Autocompletes command
Ctrl + C- Break out of commandCtrl + L- Clear screenCtrl + A- Move to beginning of lineCtrl + E- Move to end of lineCtrl + U- Erase everything from cursor to beginning of lineCtrl + K- Erase everything from cursor to end of lineCtrl + W- Erase word preceding cursorCtrl + Y- Paste everything that you erasedCtrl + P- See previous commandCtrl + N- See next command!!- Rerun last commandsudo !!- Rerun last command with sudo. For when you forgot to run the command as adminAlt + F- Move cursor forward by one wordAlt + B- Move cursor backward by one word
VIM / VI
Input Commands
- https://www.atmos.albany.edu/daes/atmclasses/atm350/vi_cheat_sheet.pdf
- Backup incase the above link gets deleted: https://archive.org/download/vi_cheat_sheet/vi_cheat_sheet.pdf
Network Troubleshooting
ifconfigroute -narp -a
IPTables
iptables -LList iptable rulesiptables -t filter -FFlush All Iptables Chains/Firewall rulesiptables -t filter -XDelete all Iptables Chains- Deny all traffic. Create rules to allow outbound traffic now
iptables -P INPUT DENYiptables -P FORWARD DENYiptables -P OUTPUT DENY
Guides
- Beginner guide https://archive.is/DrBI1
- Session tracking https://archive.is/mz2F6
TMUX
Misc Links
Blue Team
D3fend Framework
DFIR Resources
- https://www.jaiminton.com/cheatsheet/DFIR/
- https://github.com/JPCERTCC/LogonTracer
- https://github.com/sans-blue-team/DeepBlueCLI
- https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/
- https://jpcertcc.github.io/ToolAnalysisResultSheet/
- https://play.backdoorsandbreaches.com/ IR game
- https://learn.microsoft.com/en-us/windows-server/identity/securing-privileged-access/reference-tools-logon-types
Blogs
- https://thinkdfir.com/
- https://www.13cubed.com/
- https://www.inversecos.com/
- https://osdfir.blogspot.com/
- https://tisiphone.net
- https://aboutdfir.com/
- https://www.mac4n6.com/
- https://smarterforensics.com/blog/
- https://binaryforay.blogspot.com/
- https://dforensic.blogspot.com/
Podcasts
Cyber Chef
- https://gchq.github.io/CyberChef/
- URL decode
- FromHex
- Frombase64
- Unique
- Extract IP addresses
- Extract email addresses
- Extract URLs
- Extract Domains
Regex
Logging
- https://github.com/ukncsc/lme
- https://github.com/activecm/docker-zeek
- https://what2log.com/
- https://github.com/SwiftOnSecurity/sysmon-config
- https://learn.microsoft.com/en-us/sysinternals/downloads/sysmon
- https://github.com/olafhartong/sysmon-cheatsheet/blob/master/Sysmon-Cheatsheet.pdf
- https://github.com/Yamato-Security/EnableWindowsLogSettings
- https://github.com/nsacyber/Event-Forwarding-Guidance/tree/master/Events
Hardening Guides
-
https://www.cisecurity.org/cis-benchmarks/
CIS has some great guides for system hardening!
-
https://www.cisco.com/c/en/us/support/docs/ip/access-lists/13608-21.html
OSINT
- https://www.numlookup.com/
- https://inteltechniques.com/tools/index.html
- https://www.aware-online.com/en/osint-tools/
BEC Compromises
Tools
Networking
I believe everyone in the technical side of cybersecurity must have a good understanding of networking.
- https://study-ccna.com/what-is-a-network/
- https://networklessons.com/cisco/ccna-routing-switching-icnd1-100-105/
- https://www.learncisco.net/courses/cisco-ccna.html Cheap used Cisco hardware can be obtained off Ebay!
You can also get Palo Alto training online for free if you’re a student with labs!
Must have tools
- https://joplinapp.org/ Good notetaking software.
- https://obsidian.md/ Another good notetaking software. I recommend using markdown since it can be used in a lot of environments.
- https://getgreenshot.org/ A good screenshot tool.
- https://www.worldtimebuddy.com/ Time zones can be tricky.
- https://www.pingplotter.com/ More for diagnosing things.
- https://www.wireshark.org/#download Wireshark.
- https://nmap.org/ Another classic.
- https://www.chiark.greenend.org.uk/~sgtatham/putty/latest.html SSH is built into Windows, but PuTTY is still common.
- https://processhacker.sourceforge.io/ For visualizing windows processes and digging deep into them! Process Explorer is an alternative.
- https://www.winitor.com/download Basic static analysis of programs.
Games
IR on Windows Boxes
Lots of this information for this section came from John Strand’s pay what you can courses. Antisyphon training is a fantastic place to learn at an affordable price. I highly recommend them.
Start with network connections and work backwards. Some of these commands require elevated privileges. Be mindful of the admin account you are using to run these on a since it is a potentially compromised system…
net viewWhat shares are open?net sessionWho is talking to this computer?net useWho is this system talking to?netstatWhat are all network connections?netstat -naobWhat are the TCP and UDP connections with port numbers and processes?netstat -fWhat are the current connections with fully qualified domain names? Look for unusual domains that aren’t MS, Google, etc.
Now look into processes. Use the above commands to look for unusual connections and then drill into the processes.
tasklistList all processestasklist /svcList all servicestasklist /mModules loaded for each processtasklist /m ntdll.dllLook for specific processes with ntdll.dlltasklist /m /fi "pid eq [proc_id]Explore specific process modulestasklist /FI "IMAGENAME eq [process_name]See all processes with that process namewmic process list fullSee lots of info about all processeswmic process get name,parentprocessid,processidAnother way to list all processeswmic process where processid=[pid] get commandlineShow commandline of specific process
IR on Linux Boxes
ps auxSee all current processestopAnother way to see current processesip aIP InfoifconfigAnother way to see IP infopingnetstat -nap
https://github.com/DominicBreuker/pspy
Training
Advanced
Intermediate
- https://www.hackthebox.com/
- https://www.antisyphontraining.com/training-calendar/
- https://bootcamps.pentesteracademy.com/courses
- https://www.alteredsecurity.com/
- https://niccs.cisa.gov/education-training/catalog
- https://www.iacis.com/
Beginner
- https://academy.tcm-sec.com/courses
- https://tryhackme.com/
- https://securityblue.team/
- https://www.sans.org/cyberaces/
Programming Resources
Python
- https://automatetheboringstuff.com/ My favorite python programming book. Extremely good.
- https://www.w3schools.com/python/default.asp
- https://nostarch.com/seriouspython Write better Python code
Golang
C#
C
Programming in Windows
Docker Resources
- [TODO]
Home Labs
ISO Images & VM’s
- Windows 10: https://www.microsoft.com/en-us/evalcenter/download-windows-10-enterprise
- Windows Server: https://www.microsoft.com/en-us/evalcenter/download-windows-server-2022
- Ubuntu Server: https://ubuntu.com/download/server
Prebuilt Lab Envs
- https://detectionlab.network/
- https://github.com/cyberdefenders/DetectionLabELK
- https://github.com/christophetd/Adaz
- https://github.com/Orange-Cyberdefense/GOAD
Guides
- https://assume-breach.medium.com/home-grown-red-team-creating-a-red-development-workstation-31092d94169b
- https://hausec.com/2021/03/04/creating-a-red-blue-team-home-lab/
Planning
Governance Risk and Compliance (GRC) & Privacy
CIS
CIS covers lots of different North American frameworks.
- https://www.cisecurity.org/controls/cis-controls-navigator/
- https://learn.cisecurity.org/cis-ram-2-download
- https://www.sans.org/information-security-policy/
- https://www.auditscripts.com/free-resources/critical-security-controls/
NIST
- [TODO]
Privacy
Privacy is split into three sections if we follow IAPP: Privacy Regulations, Management, and Technology
- https://iapp.org/store/books/a191P000003nSYrQAM/ An Introduction to Privacy for Technology Professionals
News
Techniques
-
Cynefin
-
Conscious Competence
-
Gap Analysis
-
SWOT Analysis
-
Power/Interest Grid
-
Stakeholder management
-
Boston Box
-
Feasibility Analysis
-
Cost Benefit Analysis
-
Risk Analysis
-
Time Boxing
-
MOSCOW Prioritization
[ { "title": "apples", "count": [12000, 20000], "description": { "text": "...", "sensitive": false } }, { "title": "oranges", "count": [17500, null], "description": { "text": "...", "sensitive": false } } ]