└── README.md
/README.md:
--------------------------------------------------------------------------------
1 | # Toolsets and Resources
2 | ## Table of Contents
3 |
4 |
5 | [Introduction](#intro)
6 | [Lab Environments](#labs)
7 | [Free Virtual Environments](#virtual)
8 | [Linux Operating Systems](#Linux)
9 | [Network Security Monitoring & Intrusion Detection System Tools](#nsm)
10 | [Network Mapping, Discovery, & Assessment Tools](#nmap)
11 | [Reconaissance](#recon)
12 | [Vulnerability Assessment and Penetration Testing Tools](#pen)
13 | [Threat Modeling Tools & Resources](#threat)
14 | [Cloud Security References and Resources](#cloud)
15 | [Writing and Reports](#writing)
16 | [Cryptography](#crypto)
17 |
18 |
19 | ## Introduction
20 | This is a curated list of tools and tips for students in the National University MS and BS Cybersecurity Programs.
21 |
22 | ## Lab Environments
23 |
24 | [Infosec Learning Labs](https://www.infoseclearning.com/index.aspx)
25 | [NICE Challenges](https://www.nice-challenge.com/)
26 | [National Cyber League](https://www.nationalcyberleague.org/)
27 | [ITPro.tv](https://itpro.tv/)
28 | [Immersive Labs](https://dca.immersivelabs.online/)
29 |
30 |
31 | ## Free Virtual Environments
32 |
33 | As a supplemental resource to the commercial CSIA labs that will be used for most courses, the following VM tools may be used, which allows local system setup and configuration for students to practice with toolsets. NOTE – most CSIA course assignments require the use of a hosted lab environment, where student activity is reported to the instructor; therefore, unless specifically given permission by an instructor to use a personal VM for an assignment, the options listed below are for students’ convenience only, to practice using the tools.
34 |
35 | [VMWare Player](http://www.vmware.com/products/player/playerpro-evaluation.html) - also available through the NU SSO Portal using the VMWare chiclet/link
36 | [Oracle Virtual Box](https://www.virtualbox.org/)
37 |
38 | In addition, students have access to free and low cost software through the NU SSO Portal, using the "VMware" chiclet or the "Microsoft Imagine" chiclet. On the VMware site, you can obtain WMware Workstation (current full version) for Windows or VMware Fusion for Mac-OS, to install a hosted VM platform; as well as vCenter Server (bare-metal VM platform) and vSphere (web-based workstation/client).
39 |
40 |
41 | ## Linux Operating Systems
42 |
43 | [Debian Linux](https://www.debian.org/distrib/)
44 |
45 | [Fedora Linux Workstation](https://getfedora.org/en/workstation/download/)
46 |
47 | [Fedora Linux Server](https://getfedora.org/en/server/download/)
48 |
49 | [Ubuntu Linux](http://www.ubuntu.com/)
50 |
51 | ### Debian Documentation
52 |
53 | [Debian Documentation](https://www.debian.org/doc/)
54 |
55 | [Debian User Forums](http://forums.debian.net/) - Caution: you may get an "insecure website" warning.
56 |
57 | ### Fedora Documentation
58 |
59 | [Fedora Docs Page](https://docs-old.fedoraproject.org/en-US/index.html)
60 |
61 | [Fedora Project Wiki](https://fedoraproject.org/wiki/Fedora_Project_Wiki)
62 |
63 | ### Ubuntu Documentation
64 |
65 | [Ubuntu Help](https://help.ubuntu.com/)
66 |
67 | [Ubuntu Community Wiki](https://wiki.ubuntu.com/)
68 |
69 | ### Command Line Tips and References
70 |
71 | [The Linux Command Line – A Complete Introduction by William Shotts (free downloadable PDF)]( http://linuxcommand.org/tlcl.php )
72 |
73 | [A-Z Index of Bash command line for Linux (SS64.com)](http://ss64.com/bash/ )
74 |
75 | ### Using the Terminal
76 | There are some Linux commands you should learn and become familiar with, but first, some background and syntax used in many lab assignments:
77 | When you open a Terminal (text prompt) session in Linux, you will see something similar to
78 | the following command prompt, which indicates logged-in user, the system name, and the
79 | current directory (in this case, “~” indicates the student’s Home directory):
80 | [student@fedora ~] $ █
81 | {The cursor will be black on a light color background or white on a black background and it will blink}
82 | In the lab instructions, when you see a pound-sign “#” (aka hash mark), that indicates a comment and not part of the actual command; however, the particular comment may be telling you to enter a specific command, which would be entered immediately after the “$” (as in the sample command prompt above). A comment can be entered on the same line as a command, after the full command and options/parameters are entered; the system will not execute anything after the “#” comment symbol. This is useful in documenting scripts.
83 | Now, the Linux commands you should research and learn to use for the labs (with comments):
84 | $ su # this will let you change from the current logged in user to a different user; such as ‘Root’; however, you must know the other user’s password
85 | $ sudo # or a similar command option (next line)
86 | $ sudo -i # these two let you issue a command with Admin rights; and you will be prompted to enter your login password
87 | $ chmod # modifies permissions to a folder/directory or file
88 | $ chown # changes ownership of a folder/directory or file
89 | $ ifconfig # lists the local network adapters and their settings; the most common option is ‘-a’ (for “all”)
90 | $ ls # lists the files/folders within the current directory/folder the first character is lower-case “L” not the number one
91 | As other common commands are developed for the various lab assignments, they will be added to the section above.
92 |
93 |
94 | ## Network Security Monitoring & Intrusion Detection System Tools
95 |
96 | [Security Onion](https://securityonion.net)
97 | [Bro IDS](https://www.bro.org)
98 | [Sguil: The Analyst Console for Network Security Monitoring](http://bammv.github.io/sguil/index.html)
99 | [Snorby](https://github.com/Snorby/snorby)
100 | [SOF-ELK® VM Distribution](https://github.com/philhagen/sof-elk/blob/master/VM_README.md)
101 | [Rock NSM](http://rocknsm.io)
102 | [Suricata IDS/NSM engine](https://suricata-ids.org)
103 | [Wireshark](https://www.wireshark.org)
104 | [Network Miner](http://www.netresec.com/?page=NetworkMiner)
105 | [CapLoader](http://www.netresec.com/?page=CapLoader)
106 | [SplitCap](http://www.netresec.com/?page=SplitCap)
107 | [How to: Split large packet captures with tcpdump](http://www.sysadminx.com/2013/01/25/how-to-split-large-packet-captures-with-tcpdump/)
108 |
109 | ### EBooks available in the NU Library (Login required)
110 |
111 | - Network Intrusion Analysis: Methodologies, Tools and Techniques for Incident Analysis and Response; Fichera, Joe and Bolt, Steven; 2013
112 |
113 | - Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems; Sanders, Chris; 2007
114 |
115 | - Snort 2.0 Intrusion Detection; Beale, Jay / Caswell, Brian / Foster, James C. / Posluns, Jeffrey; 2003
116 |
117 | - Network Flow Analysis; Lucas, Michael; 2010
118 |
119 |
120 | ## Network Mapping, Discovery, & Assessment Tools
121 | [Network Mapper (NMAP)](https://nmap.org)
122 | [NMAP Reference Guide](https://nmap.org/book/man.html)
123 | [Zenmap GUI for NMAP](https://nmap.org/zenmap/)
124 | [OpenVAS](http://www.openvas.org)
125 | [Angry IP Scanner](https://angryip.org)
126 |
127 | ## Recon
128 | [Google Hacking Database](https://www.exploit-db.com/google-hacking-database/)
129 | [Shodan](https://www.shodan.io/)
130 | [Using Shodan](https://danielmiessler.com/study/shodan/)
131 | [Censys](https://censys.io/)
132 |
133 | ### Videos
134 | [First Google Hacking Talk by Johnny Log](https://www.youtube.com/watch?v=Lr2oECRgTqM)
135 | [Shodan Search Engine for Hackers](https://www.youtube.com/watch?v=d7x-Bn_bqt0)
136 |
137 | ## Vulnerability Assessment and Penetration Testing Tools
138 |
139 | [Kali Linux](https://www.kali.org)
140 | [Kali Documentation](https://www.kali.org/kali-linux-documentation/)
141 | [Nessus](https://www.tenable.com/products/nessus/nessus-professional)
142 | [BlackArch Linux](https://blackarch.org)
143 | [BlackArch Download](https://blackarch.org/downloads.html)
144 | [BlackArch Documentation](https://blackarch.org/guide.html)
145 | [Parrot Security OS](http://parrotsec.org)
146 | [Parrot Security Download](http://parrotsec.org/download.php)
147 | [Parrot Security Documentation](https://docs.parrotsec.org/doku.php)
148 |
149 |
150 | ## Threat Modeling Tools & Resources
151 | [Microsoft SDL Threat Modeling Tool](https://www.microsoft.com/en-us/sdl/adopt/threatmodeling.aspx)
152 | [Microsoft SDL Tool Download](https://www.microsoft.com/en-us/download/details.aspx?id=49168)
153 | [IT Infrastructure Threat Modeling Guide](https://technet.microsoft.com/en-us/library/dd941826.aspx)
154 | [Introduction to Threat Modeling (File Download](https://download.microsoft.com/.../9/3/5/.../Introduction_to_Threat_Modeling.ppsx)
155 | [Microsoft SDL Process: Design (go to SDL Practice #7 and open ‘Resources’) ](https://www.microsoft.com/en-us/sdl/process/design.aspx)
156 | [Elevation of Privelige Card Game](https://www.microsoft.com/en-us/sdl/adopt/eop.aspx)
157 | [OWASP Application Threat Modeling](https://www.owasp.org/index.php/Application_Threat_Modeling)
158 | [OWASP Threat Model Project](https://www.owasp.org/index.php/OWASP_Threat_Model_Project)
159 |
160 | ### Videos
161 |
162 | [SDL Threat Modeling Tool](https://www.youtube.com/watch?v=iV2SAuTxIUc)
163 |
164 | [Threat Modeling Tool Principles](https://www.youtube.com/watch?v=wUt8gVxmO-0)
165 |
166 | [Creating a Threat Model Using TMT-2016 Intermediate Level - NU Lecture](https://youtu.be/-VokDIHS5XM)
167 |
168 |
169 | ## Cloud Security References and Resources
170 |
171 | [Cloud Security Alliance](https://cloudsecurityalliance.org)
172 | [ENISA Cloud Security Guidance](https://www.enisa.europa.eu/topics/cloud-and-big-data/cloud-security)
173 |
174 |
175 | ## Writing and Reporting
176 | [Bishop Fox Style Guide](https://www.bishopfox.com/blog/2018/06/reintroducing-the-cybersecurity-style-guide-v1-1/)
177 |
178 | ## Cryptography
179 | [Learn Cryptography](http://https://learncryptography.com/encryption)
180 | [Cipher Tools](http://rumkin.com/tools/cipher/)
181 | [Khan Academy - Journey into Cryptography](https://www.khanacademy.org/computing/computer-science/cryptography)
182 | ### Onlie Crypto Challenges
183 | [The Cryptopals crypto challenges](https://cryptopals.com/)
184 | [NSA Crypto Challenge Puzzle of the Week](http://cryptochallenge.io/)
185 | [Khan Academy Crypto Challenge](https://www.khanacademy.org/computing/computer-science/cryptography/cryptochallenge/a/cryptochallenge-introduction)
186 | [Crypto CTFs](https://ctfs.github.io/resources/)
187 | [Net Force Crypto Challenges](https://www.net-force.nl/challenges/)
188 |
189 |
190 |
191 |
--------------------------------------------------------------------------------