WiFi Exploitation Framework (WEF)

 A fully offensive framework to the 802.11 networks and protocols with different types of attacks for WPA/WPA2 and WEP, automated hash cracking, bluetooth hacking and much more.

Tested and supported in Kali LinuxParrot OS and Arch Linux.

 SUPPORTED ATTACKS:

  • Deauthentication Attack

  • Authentication Attack

  • Beacon Flood Attack

  • PMKID Attack

  • EvilTwin Attack

  • Passive/Stealthy Attack

  • Pixie Dust Attack

  • Null Pin Attack

  • WEP Protocol Attacks

  • Michael Exploitation Attack

  • Jamming, Reading and Writing bluetooth connections (Not finished)

  • GPS Spoofing with HackRF

 FEATURES:

☑️ Descriptives attack logs

☑️ WPA/WPA2, WPS and WEP Attacks

☑️ Auto handshake cracking

☑️ Multiple templates for EvilTwin attack

☑️ Check monitor mode and its status

☑️ 2.4Ghz and 5Ghz attacks

☑️ Custom wordlist selector

☑️ Auto detect requirements

To learn more and to install go here

NIST Releases Draft NIST IR 8408: Understanding Stablecoin Technology and Related Security Considerations

The initial public draft of NIST IR 8408, Understanding
Stablecoin Technology and Related Security Considerations
,
is available for comment. Stablecoins are a type of cryptocurrency that aim
to maintain a stable price relative to a specified asset (usually a fiat
currency). Much has been written about how to use stablecoins and about the
economic implications of doing so (specifically price variability), but
little has been written on the technical mechanisms and architectures used and
related security considerations. NIST IR 8408 addresses this by providing an
evaluation of the technical design of different stablecoin architectures
along with related security analyses.

The public comment period for this initial public draft is open
through January 6, 2023.
See the publication
details
for a copy of the draft and instructions for submitting
your comments.

NOTE: A call for patent claims is included on page iv of this
draft. For additional information, see the Information
Technology Laboratory (ITL) Patent Policy – Inclusion of Patents in ITL
Publications
.

Read More


Adalanche Open Source a toll for understanding Active Directory

 Adalanche gives instant results, showing you what permissions users and groups have in an Active Directory. It is useful for visualizing and exploring who can take over accounts, machines or the entire domain, and can be used to find and show misconfigurations.

Active Directory security is notoriously difficult. Small organizations generally have no idea what they’re doing, and way too many people are just added to Domain Admins. In large organizations you have a huge number of people with different needs, and they are delegated access to varying degrees of power in the AD. At some point in time, someone makes a mistake, and that can cost you dearly.

Download

Adalanche is an all-in-one binary – it collects information from Active Directory or from local Windows machines and can the analyze the collected data. If you’re only doing AD analysis, just grab the binary for your preferred platform. Later you can deploy the dedicated collector .exe for your Windows member machines via a GPO or other orchestration and get even more insight.

Download either the latest release or the build of the latest commit from Releases. Usually running with the latest commit is fine, but there might be a problem here and there. Releases are considered stable and are for the less adventurous.

Go here to download from GitHub 

NOTICE this tool should be used only if authorized.

Is it dangerous to run adalanche?

No, it is not. Running adalanche requires nothing more than a regular user account, and works by connecting to Active Directory services and querying (reading) data from the LDAP object store, and by reading files from the SYSVOL file share (optional). This data is available to all users, and is also what attackers use to do initial reconnaissance.

PowerShell Training Info

800 XP

Introduction to PowerShell

Learn about the basics of PowerShell. This cross-platform command-line shell and scripting language is built for task automation and configuration management. You’ll learn basics like what PowerShell is, what it’s used for, and how to use it.

Learning objectives

After completing this module, you’ll be able to:

  • Understand what PowerShell is and what you can use it for.
  • Use commands to automate tasks.
Start

Prerequisites

  • Basic familiarity with using a command-line shell like Command Prompt or Git Bash
  • Visual Studio Code installed
  • Ability to install Visual Studio Code extensions
  • Ability to install software on your computer, if you’re not using a Windows operating system

This module is part of these learning paths

Other sites 

 1. PowerShell tutorial for beginners – https://lnkd.in/ezsh8qE6

2. Learn PowerShell in a month of lunches –https://lnkd.in/eDCN-av6

3. PowerShell.org’s YouTube – https://lnkd.in/eAs-zExH

4. The DevOps collective inc. – https://lnkd.in/e_4U6Da3

5. All things PowerShell by Shane Young – https://lnkd.in/e5eQz2Su

6. PowerShell for beginners – https://lnkd.in/eKJDJxC2

7. Coursesity- https://lnkd.in/eyvcdJgJ

8. Using Powershell in Cybersecurity – https://lnkd.in/eYsVz48K

9. PowerShell Masterclass Fundamentals – https://lnkd.in/eR8J6YHN

10. Essential Tools for Windows System Administrators – https://lnkd.in/ekSP6zch

I will be speaking at  ChannelPro SMB Forum: Los Angeles event, which will be held
November 2-3, 2022, at the Pacific Palms Resort. 


November 2nd

MSP-Ignite Peer-to-Peer Session

ChannelPro is now partnering with MSP-Ignite to bring peer-to-peer sessions to ChannelPro SMB Forums. Join us for an afternoon of interactive discussions on MRR profitability, owner-led sales challenges, hiring and staff retention suggestions, the importance of a positive culture, cybersecurity profiles, and more. Industry veteran Steve Alexander brings 10 years of facilitation experience and 37 in the industry to you for this no cost peer-to-peer interactive discussion. Share your successes and challenges for the benefit of everyone in the room. Steve will be joined by sales pro Ashley Lalumiere to guide you through the common sales challenges with a roadmap to successful owner-led sales. Peer session will be on Nov. 2nd from 2 to 4:30pm.

Pre-Game with Dell Expert Network

ChannelPro and Dell Expert Network have partnered to offer a sales and marketing workshop, which also includes a Dell Solutions showcase of their latest technology! This workshop will run the day before the ChannelPro SMB Forum on Nov. 2nd at the hotel from 5 – 7pm. There will be a $1,000 cash giveaway at the event!

Cocktail Reception

Welcome Cocktail Reception from 7-9pm PT at the hotel. This is a great time to unwind and meet folks prior to the main day event.

November 3rd

Breakfast, Registration, and Networking Time

Doors open at 7:30am PT with a nice breakfast. Sessions begin at 8:00am PT.

The Security Slam

This is no poetry competition, channel pros. Listen to three cybersecurity service providers tell true-life stories of incredible hacks, unforgiveable customer errors, and high-stakes incident responses, and then learn how to apply their experiences to protecting your clients more effectively.

Peer to Peer: Winning with Microsoft Azure

There’s big money to be made in Microsoft’s public cloud platform—if you know what to offer and where to begin. See how channel pros like you are profiting from Azure-based solutions today.

Luncheon and Sponsor Showcase

Visit the sponsors in their booths to learn more about their products and solutions!

The Employee Recruitment Dating Game

In the current hiring climate, finding the love of your IT life is tougher than ever. Do you have what it takes to find, woo, and win the best tech talent out there? See how three of your peers handle real-world employee interview challenges in this Sixties-style game show.

Social Media Sales Strategy

Social media platforms can be powerful lead-generation tools. In this hands-on workshop, led by experts from channel legend Janet Schijns’ JS Group, you’ll learn proven, practical techniques used by social selling masters, and get free access to an extensive series of online follow-up lessons.

Presenters:

Managed Services Strategy Survivor

Who gets voted off the island? It’s up to you! Hear three of the industry’s top managed services consultants field tough questions about the M&A strategy, product strategy, and growth strategy today’s MSPs need to survive in a changing market. Then pick the sole survivor!

Mobile Passwords–Tricks & Treats

 

Mobile Passwords–Tricks
& Treats

The NCCoE Buzz: Mobile Security Edition is a recurring email on
timely topics in mobile device cybersecurity and privacy from the National
Cybersecurity Center of Excellence’s (NCCoE’s) Mobile Device Security project
team


 

NCCoE Buzz MDS Halloween Passwords

With Halloween around the corner, the National Cybersecurity
Center of Excellence (NCCoE) wants to share a few “tricks” and tips for mobile
passwords that result in the “treat” of protecting your mobile device from
compromise. 

Potential Threats

Below is a list of several potential mobile password threats that
can impact you or your organization:

  • Lost/Stolen
    Phone
    – If an unauthorized user
    obtains a lost or stolen mobile phone that has no password, they may have
    easy access to sensitive information on the device (e.g., messages,
    photos, or email)
  • Brute-Force
    Attack
    – If a mobile phone has a weak
    password, a malicious attacker may be able to easily obtain the password
    and gain access to information on the mobile phone
  • Phishing – If a password is captured by texting or emailing to
    convince a user or subscriber into thinking the attacker is a verifier or
    reliable party, the attacker can gain access to a user’s account(s) and
    access sensitive information

Password Protections

To protect against mobile password threats, here are a few tips:

1. Apply multi-factor authentication.

If a password is compromised, requiring a second factor for
authentication can help protect against threats such as phishing attacks. 

Multi-factor authentication can be any combination of the
following:

  • Something you know – Password, pin, etc.
  • Something you have – Authenticator app, hardware token, etc.
  • Something you are – Biometrics (e.g., fingerprint or face recognition)

For example, if an attacker has acquired your password (something
you know) through a phishing attack, but your account requires a password +
your fingerprint (something you are) to grant access, then the attacker will
not be able to access your account because they do not have access to the
second factor.

2. Choose a password with a minimum length of 8 characters.

A common misconception is that complexity is the key to having a
strong password. NIST SP 800-63B highlights that complexity can actually make
it difficult for the user to remember their password and can deter them from
developing a strong memorable password.

Instead, 800-63B recommends creating a memorable password that is
at least 8 characters in length to help prevent against brute-force attacks,
while also ensuring the user can remember their password/pin/passphrase.

We hope these mobile password tricks and treats were helpful.

Additional Resources

More information about how to use and apply specific
authenticators can be found in NIST Special Publication 800-63B Digital Identity Guidelines: Authentication and Lifecycle Management.

More information on how to protect against other potential mobile
threats can be found in NIST SP 1800-22 Mobile Device Security: Bring Your Own Device.

 

CISA Upgrades to Version 2.0 of Traffic Light Protocol in One Week – Join Us

 On Nov. 1, 2022, CISA will upgrade from Traffic Light Protocol (TLP) 1.0 to
TLP 2.0 in accordance with the recommendation by the Forum of Incident Response Security Teams
(FIRST)
 that organizations move to 2.0 by the end of 2022. TLP Version
2.0 brings the following key updates:

  • TLP:CLEAR replaces TLP:WHITE for publicly releasable
    information.
  • TLP:AMBER+STRICT supplements TLP:AMBER, clarifying when
    information  may be shared with the recipient’s organization only.

CISA encourages all network defenders and partners to upgrade to TLP Version
2.0 to facilitate greater information sharing and collaboration. For more
information see:

Last Chance! Register for Today’s NCCoE Healthcare Community of Interest Update

Back in August, the NCCoE Healthcare team released the final
project description
Mitigating
Cybersecurity Risk in Telehealth Smart Home Integration
.

This project’s goal is to provide health delivery organizations (HDOs) with
practical solutions for securing an ecosystem that incorporates consumer-owned
smart home devices into an HDO-managed telehealth solution.

Register now to hear an update from the NCCoE Healthcare team on
the following topics:

  • The Smart Home Integration
    Project Description
  • The Federal Register Notice
    (FRN) Status
  • The NCCoE project approach and
    potential collaboration opportunities
  • Next steps for the NCCoE
    Healthcare team

There will be 45 minutes of presentation and 15 minutes of Q&A
at the end of the webinar.

This event takes place at 2 PM today. The
event page includes details on the overview of the call as well as a link to
the registration page. If you have any questions, please email our team at hit_nccoe@nist.gov.

Event
Page

CMVP Security Policy Requirements: NIST SP 800-140B Rev. 1 (Second Public Draft)

 The second public draft of NIST Special Publication (SP)
800-140Br1 (Revision 1),
CMVP Security
Policy Requirements: CMVP Validation Authority Updates to ISO/IEC 24759 and
ISO/IEC 19790 Annex B
, is now available for public
comment.

The initial public draft introduced four significant changes to
NIST SP 800-140B:

  1. Defines a more detailed
    structure and organization for the Security Policy
  2. Captures Security Policy
    requirements that are defined outside of ISO/IEC 19790 and ISO/IEC 24759
  3. Builds the Security Policy
    document as a combination of the subsection information
  4. Generates the approved
    algorithm table based on lab/vendor selections from the algorithm tests

This second draft addresses the comments made on the initial
draft, including concerns with the structure of the Security Policy and the
process for creating it. Appendix B provides details on these changes.

The NIST SP 800-140x series supports Federal Information
Processing Standards (FIPS) Publication 140-3, Security Requirements for Cryptographic Modules,
and its associated validation testing program, the Cryptographic Module
Validation Program (CMVP). The series specifies modifications to ISO/IEC 19790
Annexes and ISO/IEC 24759 as permitted by the validation authority.

The public comment period is open through December 5, 2022. See
the publication
details
for instructions on submitting comments.

Read
More

Public Comment Period Extended to 10/5 | Implementing the HIPAA Security Rule: Draft NIST SP 800-66, Rev. 2

 The public comment period has been extended for the initial public
draft of NIST Special Publication (SP) 800-66r2 (Revision 2),
Implementing the
Health Insurance Portability and Accountability Act (HIPAA) Security Rule
: A Cybersecurity Resource Guide.
The new comment deadline
is October 5, 2022.

The HIPAA Security Rule specifically focuses on protecting the
confidentiality, integrity, and availability of electronic protected health
information (ePHI), as defined by the Security Rule. All HIPAA-regulated
entities must comply with the requirements of the Security Rule.

This draft:

  • Includes a brief overview of
    the HIPAA Security Rule
  • Provides guidance for regulated
    entities on assessing and managing risks to ePHI
  • Identifies typical activities
    that a regulated entity might consider implementing as part of an
    information security program
  • Lists additional resources that
    regulated entities may find useful in implementing the Security Rule

Please submit comments to sp800-66-comments@nist.gov through October 5, 2022.
See the publication
details
for a copy of the draft and instructions for submitting
comments.

NOTE: A call for patent claims is included on page v of this
draft. For additional information, see the
Information Technology Laboratory (ITL) Patent Policy –
Inclusion of Patents in ITL Publications
.

Read
More