
Intelligence
Tags | Espionagecybersecurityinformation gatheringsecurity |
---|---|
Created | |
Updated |
Requisites
Resources
Foundations
Name | Tags |
---|---|
Wenliang Du - Computer & Internet Security_ A Hands-on Approach-Wenliang Du | |
Untitled | |
Untitled |
Inside Network Perimeter Security (2nd Edition). Northcutt, Zeltser, Winter and Ritchey. 2005.
Introduction
What is Intelligence?
Security theats, policies, and mechanisms
Design issues
Crptography
Safety vs Security
Physical security
Geopolitics and microchips
https://www.youtube.com/watch?v=k_zz3239DA0&ab_channel=JohnnyHarris
Why does Intelligence matter to you?
Research
Secure channels
Ecosystem
Standards, jobs, industry, roles, …
Hacker One
Red teams
bug bounty hunter
Hacking, hackers, crackers, ….
Conferences
DefCon
BugCon
Jobs
Intelligence Analysts
Culture
https://www.youtube.com/watch?v=przDcQe6n5o&ab_channel=Google
Story
FAQ
Worked examples
Chapter Name
Prove
Notes
Worked examples
- Mathematics or Code. Automatic Verification such as Testing or Lean Proven?
- Languages in Anki.
FAQ
Further resources
Next steps
Intelligence assessment
Intelligence assessment, Intelligence or Intel (information gathering)
Espionage
Edward Snowden
Strategic intelligence
Military intelligence
Business intelligence
Police intelligence
References
Institutions
National Intelligence Centre in Mexico
Literature
Lerner, K. Lee and Brenda Wilmoth Lerner, eds. Encyclopedia of Espionage, Intelligence and Security (2003)
La seguridad nacional de México, una visión integradora
https://www.youtube.com/watch?v=tUjBpvxupq8&ab_channel=ADNOpinión
Research
Journal of Information and Intelligence
Cyberwarfare
Operation Aurora
Mass media
Libres, L. V. n. h. (2018, April 13). LAS NOTICIAS SON PROPAGANDA - ABRE LOS OJOS. Youtube. Retrieved from https://www.youtube.com/watch?v=naleYSK-5y8&t=15s&ab_channel=LaVerdadnosharálibres
Social engineering
OSINT
USB Protection
https://github.com/USBGuard/usbguard
Law
Entropy
Hash functions
Encryption
Symmetric cryptography
Asymmetric cryptography
PGP and GPG
gpg -c file
gpg --decrypt file.asc
gpg --search-key DF0925CFEC52C98E4CEB826ADB57E52EDEE4E4D2
echo "Hello World! This is important. My real name is [email protected]" | gpg --encrypt --sign --armor -r DF0925CFEC52C98E4CEB826ADB57E52EDEE4E4D
gpg --armor --export DF0925CFEC52C98E4CEB826ADB57E52EDEE4E4D2
# Prints the GPG key ID, in ASCII armor format
Web of trust
Social proof
(Admin), X. G. (2022). A Practical Guide to GPG Part 1: Generate Your Public/Private Key Pair. LinuxBabe. Retrieved from https://www.linuxbabe.com/security/a-practical-guide-to-gpg-part-1-generate-your-keypair
Ellingwood, J. (2017). How To Use GPG to Encrypt and Sign Messages. DigitalOcean. Retrieved from https://www.digitalocean.com/community/tutorials/how-to-use-gpg-to-encrypt-and-sign-messages
Security and Cryptography. (2022, October 27). Retrieved from https://missing.csail.mit.edu/2020/security
GPG Keys Cheatsheet. (2022, November 02). Retrieved from https://rtcamp.com/tutorials/linux/gpg-keys
Spam?
Spam protection for public GPG keys? (2022, November 02). Retrieved from https://security.stackexchange.com/questions/119271/spam-protection-for-public-gpg-keys
Plain text
Proton Email
Signal, Keybase
Full disk encryption
cryptsetup + LUKS on Linux, BitLocker on Windows, or FileVault on macOS.
Cracking tools
https://github.com/Ciphey/Ciphey
SSL, HTTPS, …
Yubikeys
Password manager
Authentication
Two-factor authentication
Backups
https://wiki.nikiv.dev/backups/
Useful idiot
Matrix (social app)
5 eyes alliance
Federation
Tor
Zero-knowledge architecture
Zero-trust
Zero-knowledge proof
https://www.youtube.com/watch?v=HUs1bH85X9I&ab_channel=Computerphile
https://www.youtube.com/watch?v=cI5lkif-V1c&ab_channel=ALEXonScience
https://www.youtube.com/watch?v=yn6CPQ9RioA&ab_channel=IBMTechnology
AAA framework
IETF protocol for AAA
Kerberos
Open Radius
OAuth
SAML
Multi-tenant
SASL2 https://www.gnu.org/software/gsasl/
Secure channels
Authentication
Message integrity and confidentiality
Kerberos
Access control
General issues in access control
Firewals
Secure mobile code
Denials of service
Secure naming
Security management
Key management
Secure group management
Authorization management
Authority
Authorization
Accounting
FAQ
tor vs vpn
One, T. H. (2020, February 08). Tor vs VPN | Which one should you use for privacy, anonymity and security. Youtube. Retrieved from https://www.youtube.com/watch?v=6ohvf03NiIA&ab_channel=TheHatedOne
Cyber Intelligence
IMSI Catchers
Virus and Malware
"Malicious Software" de Eric L. Freudenthal,
"The Art of Computer Virus Research and Defense" by Peter Szor,
"Computer Viruses and Malware" by Markus Jakobsson and Zulfikar Ramzan
Computer Viruses and Malware by Jonh Aycock
https://github.com/mav8557/virus
TODO
CTF
USB Keystroke Injection Protection
Enlace Hacktivista. (2022, September 19). Retrieved from https://enlacehacktivista.org/index.php?title=Enlace_Hacktivista
OWASP
https://www.youtube.com/watch?v=ZrXhoT_tXFE&ab_channel=%24DebugSec%24
Rafael Bucio â â µ on Twitter. (2022, October 01). Retrieved from https://twitter.com/Bucio/status/1575987501457494016
Children education
Welcome to Mara Turing Official Website for UK. (2021, March 07). Retrieved from https://maraturing.us
Mara Turing: El despertar de los hackers (The Awakening of the Hackers)
Physical security and cybersecurity – are they so different?
Security and Cryptography. (2022, October 27). Retrieved from https://missing.csail.mit.edu/2020/security
The Hated One - YouTube. (2022, October 30). Youtube. Retrieved from https://www.youtube.com/c/TheHatedOne/videos
Folker, R. (2016, August 22). Intelligence Research & Collection. Youtube. Retrieved from https://www.youtube.com/watch?v=onfCJiw6iEI&ab_channel=RobertFolker