Lecture Notes on Cybersecurity Tools and Techniques

Jul 30, 2024

Lecture Notes on Cybersecurity Tools and Techniques


Disclaimer

  • This video is for educational purposes only.
  • Support the creator by not using ad blockers.

Overview of Social Media Tracking

  • Used Sherlock Hacker for social media accounts tracking.
  • Can find friends or others by using tracking methods.

Concepts Covered in Previous Parts

  • Basics of Operating Systems.
  • Virtual Installation.
  • Live Boot of Kali Linux.
  • Basic Commands in Kali.
  • Numeric to Binary Conversion.
  • Computer Memory Basics.
  • Introduction to IP Addressing:
    • Classful Addressing: Predefined network and host portions.
    • Classless Addressing: Flexible; no fixed subnet masks, allowing dynamic network allocation.
    • CIDR (Classless Inter-Domain Routing) introduced for more efficient IP address allocation.

Detailed Topics Covered

IP Addressing (Part 1 & 2)

  • Subnetting: Understanding division of IP ranges into subnets; calculating hosts.
    • Total addresses in a subnet = 2^n, where n is the number of host bits.
  • MAC Addressing: Physical address of a device, cannot be changed; useful for network tracking and security.

Tools for Information Gathering

  • Sherlock Hacker: Used for finding social media accounts.
  • The Harvester: To extract email addresses and personnel info from search engines.
    • Can be run via terminal commands.
  • Google Dorking: Uses specific search queries to unveil hidden information.
  • OSINT Techniques: Acquiring information from publicly available sources.

Advanced Information Extraction Tools

  • Photon: Extracts information from websites, including directories and potentially sensitive files.
  • Spider Foot: A tool for automating information gathering on various domains, IPs, etc.
  • G-Racon: Easily performs scans for domain information.
  • FOCA: Used for extracting metadata from documents and other files.
  • Scanners: Network and vulnerability scanning techniques.

Social Engineering and Reconnaissance Techniques

  • Physical Recon: Gathering data through physical presence (e.g., visiting a site).
  • Social Engineering: Manipulating individuals to reveal confidential information.
    • Example: Convincing individuals on the grounds of job security to gain access.

Phishing Techniques

  • Tools such as Pi Phisher and G-Phisher to create custom phishing pages.
  • HT Track: Clones websites for offline viewing; useful for phishing setups.

Practical Demonstrations

Potential Methods of Information Gathering

  • Extract details from images using EXIF data (GPS location, camera settings).
  • Web scraping public websites for usernames, addresses, and other data.

Closing Notes

  • Encouraged the importance of ethical hacking and cybersecurity practices.
  • Future videos will focus on penetration testing and vulnerability scanning.

Questions and Interaction

  • Invited viewers to add their questions or confusions in the comment sections for clarification.

Summary of Upcoming Parts

  • Expect new tools for website cloning, gathering metadata, and further networking topics.

End of Notes