Posts

Showing posts from April, 2021

How to create DHCP server and a policy in the Fortigate

Here is an example script that demonstrates how to use the  fortigate-api  package to create a DHCP server and a policy in the Fortigate   from fortigate_api import FortigateAPI # Create a FortigateAPI object fgt = FortigateAPI(host="host", username="username", password="password") # Create a DHCP server data = {     "default-gateway": "192.168.255.1",     "netmask": "255.255.255.0",     "interface": "vlan.123",     "ip-range": [         {"start-ip": "192.168.255.2", "end-ip": "192.168.255.254",}     ], } fgt.dhcp_server.create(data) # Create a policy in the Fortigate data = dict(     name="POLICY",     status="enable",     action="accept",     srcintf=[{"name": "any"}],     dstintf=[{"name": "any"}],     srcaddr=[{"name": "all"}],     dstaddr=[{"name&quo

Top 7 Vulnerability found on Android

Image
 As we all know android mobile phones are nowadays becoming very popular due to their craze in the market and their  Open Source format of google. People can now download and install any application from any unknown source without knowing whether it's a harmful app or not. There were lots of Android update patches you would have gotten over your mobile phone this shows how much your mobile is vulnerable even if the patches are fixed also there are some issues that were not yet identified 🆔 so be careful while downloading any application or giving any permission of access to those unwanted application's. Vulnerabilities Expert testing an Android mobile has proven that in most cases insecure data storage is the common security flaw in android applications. According to the report, vulnerabilities are more suspicious in Android applications as compared to IOS and Windows (43% vs 38%). But the expert says that the difference is minimal the level of security between both platfor

Top 5 SKILLS TO GET INTO CYBERSECURITY

Image
 If you new to the field or looking for a career transaction than this blog post is for you read out. There are so much information available on the internet but it's hard to even start like you might heard of super Certification such as: CEH : Certified Ethical Hacker. CISM (Certified Information Security Manager) CompTIA Security+ CISSP (Certified Information Systems Security Professional) GSEC : GIAC Security Essentials.  ECSA : EC-Council Certified Security Analyst.  GPEN : GIAC Penetration Tester.  SSCP : Systems Security Certified Practitione etc. Cybersecurity Certifications But I will tell you that these are not that important as seems while there is some value when you are studying for certs but what is important is your skills and experience because in this field what you will do will make so much more successful than then these Certification would make you know. Solving technical problems is the way to earn the trust and  confidence with the people you work. So common

WhatsApp Pink scams vs GB WhatsApp, WhatsApp+

Image
 Now a days as you all know that there is a malicious link spreading all over the world 🌎 which is claiming that if you will install this then you will be getting some special features and your whatsapp colour chat theme  will be pink, so it's a kind request to all of you don't fall in this scam as if you will install this app then the hackers will gain access to your whole mobile phone 📱 and get all the data and information of yourself such as your photos, videos, documents, call history details, chat and messages. WhatsApp Pink HIGHLIGHTS:- This message is spreading all over the whatsapp group and claiming to install pink WhatsApp and get some new features. The app is promising a pink colour theme in your chat and some special features. If you will click on the link the hackers will get complete access to your mobile phone. Some other scam apps are Like GBWhatsApp and whatsapp+ these whatsapp are also creating a big scam in the market the users think that are very differ

6 Most Comman Cyber Attacks

Image
  These are the following:- Phishing  Dns Tunneling SQL Injection Zero-day exploit Man-in-the-Middle attack Denial-of-service  Phishing  : This is comman type of Cyber attack where victim tries to steal user information such as debit/credit 💳 details or may be they want to install any malware software on your system, to do this victim sends a fraud email to the target and make it as if it's from a genuine source so it is a common type of Cyber attack that everyone should learn to get protected from it. Phishing How does phishing actually works? Phishing always start with fraud email ✉️ it's tries to portray as if it is from a trusted source if the fool gives his confidential information to those on scams website the malware is automatically downloaded to the target machine and does its work. How is phishing attacks dangerous? Some of the times attackers were interested in getting credit card information for financial gain, while others tries to steal the login credentials to u

Do's And Don'ts

Do's and don'ts for approvals and mid-level officials:- 1. All classified work should be done on stand alone computers. 2. Take backup of all important information and files. 3. Do not enable remote access of file sharing form remote account. 4. Use secure deletion software for save file purging. 5. Use private browsing mode on public computers. 6. Don't store the information on private cloud service like Google drive Dropbox iCloud if it is an official purpose. 7. Store information only on original located removable storage media. 8. Always reboot when required to use public computers. 9. Clean up cache files after use. 10. Regularly update the firmware of wireless devices. 11. Disable remote management features in routers to protect against unauthorised access. Do's and don'ts for System and Network Administrators:- 1. Administrator login should be restricted to account management. 2. Update software patches regularly on all systems. 3. DON'T use the built-in

Computer And Ethics

Image
 In the modern era, major development in information technology it have tremendous impact our lives. These has lead to the emergence of New world economy and transformed our planet into a global village. Although with the click of a button, one can now find solution to almost all queries, yet issues of data security and privacy in the area of Information Technology continues to us this lesson deals with the various issues and statistics regarding the implementation of policies to protect society from negative impacts of Information Technology. IMPACTS OF INFORMATION TECHNOLOGY (IT):- Information technology is widely used to communicate while storing, manipulating, creating and maintaining information electronically. Consequently, the question arises that, does it have only positive effects on our society? The answer is no. Just like any other inventions / Technology, it to is a double edged sword. Internet user take information from sources available on the Internet and present it as t

Cyber Crime related awareness

  Cyber identity theft and cyber impersonation:- What constitutes the crime and punishment in world- 1. Creating a fake account in someone else name on MS using login credentials of someone else. 2. It is a crime under section 66C and 66D of the information technology act 2000. 3. Punishment for carrying out such a crime is 3 years in jail and fine up to rupees 100000. How to avoid (public information)- 1. Follow password best practices. 2. Identifying phishing emails and avoid phishing. 3. Use safe net banking / mobile banking practices. 4. Making sure that credit / debit card PIN are kept secret. 5. Use of social media in a safe manner. Sending and publication of obscene or sexually explicit materials:- What constitutes the crime and punishment involved-  1. Is an offence under section 67 and section 67A of the information technology Act, 2000. 2. Under section 67, for fishing or transmitting of obsense material-liable to imprisonment of 3 years with fine upto rupees 5 lakh. 3. Unde

Domain Specific Safe Usage

  Safe use of E-mails 📩:- 1. Do not share your e-mail login credentials with others. 2. While using public / multi-user systems make sure that you always log out before leaving the system. 3. Password best practices--(Point 6 above). 4. Always verify the sender not only through names but also through email address. 5. Do not click on any attachment all link if the email address appears suspicious or untrustworthy. 6. Do not click on any link which promises you of a lottery win or unclaimed inheritance. 7. Never share your credit or debit card details; or net banking details to anyone through email. Safe use of social media:- 1. Always use only one social media account for each problem (that is, WhatsApp Facebook Twitter Instagram, Google Plus etc). 2. Do not share your login credentials to anyone. 3. Only add and communicate to real person whom you know outside of social media through social media platforms. 4. Many of the social media platforms May actually be fake and created to ex

Prevent Social Engineering Attacks

Image
How to avoid from social engineering attack:- 1. Avoid disclosing any official Information ℹ️ on untrusted phone 📱 calls 📞, meeting or email ✉️ messages. Attackers often pose as genuine people to gain confidential and official Information to cause a data breach. Spam calls 📞 2. Avoid phishing attacks-- do not 🚫 open 💌 untrusted email. Do not 🚫 open email attachments which do not seem relevant to any ongoing official communication. If any messages or email conveys a sense of urgency, seems to apply high pressure sales tactics, be careful of opening or clicking on any 🔗 links/ attachments. Unwanted email ✉️ 3. Avoid wishing and phishing attacks-- Do not 🚫 reveal any sensitive information over phone 📱 calls 📞 unless the source is completely verified and trusted. Ask for some verifiable credentials such as name of immediate senior (if the caller poses as an official of another Government Department). Try to get assurance as to the identity 🆔 of the caller prior to disclose any

Removable Information Storage Media

Image
  Points to be remembered while working with storage media:- 1. Try to encrypt the data before copying into removable storage media. Because by encryption we can process the data into a coded format so that this process can convert the original representation of the information, into a plain text or we can say an alternative form known as cypher. All the text which are encoded cannot be illegally access and seen in plain text format and the original information is always hidden and kept confidential. When you encrypt any data it is in cypher format and if unfortunately anyone gets access to the data it then also he or she will not be able to see your data in plain text format and its will be kept secret.  Encryption 🔑 2. Always scan all removable media with antivirus. Because many times hacker or scammer trys to get access your information in a pendrive or any removable media through malware or virus 🦠 attack which can only be saved by regularly scanning and checking it through anti

Password Management

Image
  Points to be remembered while deciding or working with password 🔑:- 1. Use care when entering passwords 🔑 in front of others. Never show your password to others always keep it secret, and frequently do changes in your password never keep your password same for years over years most of us are so careless that they don't even know there password just make a random password through Google password maker and forget it. Because you all should know that this a world 🌍 of digitalization and everything and everyone are coming online no age bound wheather it's old or young people so in this era if you want to be safe and secure then be sure and carefull while creating your password. Hence it is important for all of us to be careful while dealing with password. Password 🔑 2. Change your password 🔑 immediately if you suspect that it has been compromised. One of the best way to know wheather your password has been found online or not 🚫 is always check ✔️ it on have i been pwned