0% found this document useful (0 votes)
86 views2 pages

Identifying Cybersecurity Threats - List of Urls

This document provides a list of URLs related to identifying cybersecurity threats. It includes links grouped in the following categories: introduction, technological vulnerabilities related to networks and devices, technological vulnerabilities related to operating systems, human vulnerabilities related to convenience and passwords. Specific links highlight past hacks such as the hacking of DC surveillance cameras and the Ukrainian power grid as well as vulnerabilities in CCTV systems, network configurations like VLANs and port forwarding, password cracking tools, and strategies for generating secure passwords.

Uploaded by

Star Breaker
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
86 views2 pages

Identifying Cybersecurity Threats - List of Urls

This document provides a list of URLs related to identifying cybersecurity threats. It includes links grouped in the following categories: introduction, technological vulnerabilities related to networks and devices, technological vulnerabilities related to operating systems, human vulnerabilities related to convenience and passwords. Specific links highlight past hacks such as the hacking of DC surveillance cameras and the Ukrainian power grid as well as vulnerabilities in CCTV systems, network configurations like VLANs and port forwarding, password cracking tools, and strategies for generating secure passwords.

Uploaded by

Star Breaker
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Identifying Cybersecurity Threats – List of URLs

If a link is not mentioned here, it is an internal link from one slide to another inside the course.

Introduction
• Washingon DC CCTV hack - https://www.washingtonpost.com/local/public-safety/romanian-hackers-took-over-dc-
surveillance-cameras-just-before-presidential-inauguration-federal-prosecutors-say/2017/12/28/7a15f894-e749-
11e7-833f-155031558ff4_story.html
• Story about common CCTV vulnerabilities - https://www.theregister.co.uk/2016/03/14/cctv_insecurity_rife/
• Story about the Ukrainian power grid hack - https://www.wired.com/2016/03/inside-cunning-unprecedented-hack-
ukraines-power-grid/
• Master Thief - https://www.wired.com/2010/03/ff_masterthief_blanchard/
• Advanced search engines: Google hacking - https://www.google.com/search?q=google+hacking
• Advanced search engines: Shodan - https://www.shodan.io/

Technological vulnerabilities – networks


• VLAN - https://en.wikipedia.org/wiki/Virtual_LAN
• Port forwarding - https://en.wikipedia.org/wiki/Port_forwarding
• Backdoor utility - https://en.wikipedia.org/wiki/Backdoor_(computing)
• Reverse connection - https://en.wikipedia.org/wiki/Reverse_connection

Technological vulnerabilities – devices


• insecam.org - http://www.insecam.org

Technological vulnerabilities – operating systems


• Public information about vulnerabilities - https://cve.mitre.org/
• Privilege escalation - https://en.wikipedia.org/wiki/Privilege_escalation

Human vulnerabilities - convenience


• Cameras internet-accessible by default - https://www.wired.com/2012/05/cctv-hack/

Human vulnerabilities – passwords


• Top 1000 passwords - https://www.google.com/search?q=top+1000+passwords
• Password managers - https://www.google.com/search?q=password+manager
• Diceware strategy - https://www.youtube.com/watch?v=Pe_3cFuSw1E
• Excellent video about password cracking - https://www.youtube.com/watch?v=7U-RbOKanYs

Passwords – more information


◦ Diceware web page - http://world.std.com/~reinhold/diceware.html
◦ More information about password entropy - https://blog.webernetz.net/password-strengthentropy-characters-
vs-words/
◦ More information about dictionary word passwords - https://paul.reviews/passwords-why-using-3-random-
words-is-a-really-bad-idea/

You might also like