Skip to content

Instantly share code, notes, and snippets.

View jcohen66's full-sized avatar

Jonathan T. Cohen jcohen66

View GitHub Profile
@jcohen66
jcohen66 / cissp_wpa3.txt
Created May 30, 2024 14:54
CISSP WPA3 SAE #cissp #wpa3 #sae #psk #802.11 #pmk #pairwise #master #key
WPA3 Personal
- Based on the Dragonfly key exchange
- Uses a passphrase to generate new unique keys for each session
- Stronger defense against password guessing
- Passphrase is never sent over the air (even encrypted)
- Simulaneous Authentication of Equals (SAE)
- Mode of WPA3 that improves security for individual users
- Builds on WPA3-PSK
- Allows users to authenticate with a passphrase
- Security features
@jcohen66
jcohen66 / cissp_spread_spectrum.txt
Created May 28, 2024 19:27
CISSP DSSS vs FHSS #cissp #spread #spectrum #dsss #fhss #ofdm #wireless #802.11
Spread Spectrum Technologies
DSSS
- Splits a bit into multiple "chips"
- Uses the entire available spectrum to transmit chunks
- Faster
- More vulnerable to interference
FHSS
- Hops between frequencies when data is transmitted
@jcohen66
jcohen66 / cissp_eap_framework.txt
Last active May 28, 2024 18:56
CISSP EAP Framework 802.1X #cissp #eap #framework #certificate #supplicant #authentication #802.1X #mutual #authentication
Extensible Authentication Protocol (EAP) Framework
- Protecting
- 802.1X-based wireless access
- 802.1X-based wired access
- Point-to-Point (PPP) connections
- VPN
- Components
- Supplicant (Client that provides credentials)
- Client Certificate
- Key is in memory for session
@jcohen66
jcohen66 / cissp_EAP.txt
Created May 28, 2024 18:28
CISSP EAP Authentication Types #cissp #eap #leap #tls #peap #ttls
Extensible Authentication Protocol (EAP)
Lightweight Extensible Authentication Protocol (LEAP)
- Cisco
- Wireless access points
- Microsoft CHAP (Challenge Handshake Protocol)
- Weak
Flexible Authentication via Secure Tunneling (EAP-FAST)
- More secure
@jcohen66
jcohen66 / cissp_bas.txt
Created May 28, 2024 18:18
CISSP Breach Attack Simulation #cissp #breach #attack #simulation #bas
Breach Attack Simulation (BAS)
- Manual testing
- Vulnerability scanning
- Penatration Testing
- Point in time assessment
- Need to perform continuous testing
- Not 100% coverage
- Compliment manual testing with automation
- Generates reports of findings
- SECaaS
@jcohen66
jcohen66 / cissp_wireless_security.txt
Created May 28, 2024 17:51
CISSP Wireless Security #cissp #wireless #security #802.11
Wireless Security
Wired Equivalent Privacy (WEP)
- Developed in 1999
- First wireless security protocol
- 40 bit encryption key
- Easily hackable
Wifi Protected Access (WPA)
- Stronger encryption
@jcohen66
jcohen66 / cissp_rmf.txt
Created May 27, 2024 22:35
CISSP NIST RMF Risk Management Framework #cissp #rmf #nist #37 #risk #management #framework
NIST 800-35 Risk Management Framework (RMF)
- Build security into the system
- Promoting the development of security and privacy capabilities
- Throughout the SDLC
Steps
- Prepare
- Categorize
- Classify assets
- Select Controls
@jcohen66
jcohen66 / cissp_secure_development_lifecycle.txt
Created May 25, 2024 23:28
CISSP Microsoft SDL #cissp #sdl #microsoft #secure #development #lifecycle
Microsoft Secure Development Lifecycle (SDL)
Phases
- Training
- Requirements
- Design
- Implementation
- Verification
- Release
- Response
@jcohen66
jcohen66 / cissp_dod_osi.txt
Created May 25, 2024 22:24
CISSP OSI to TCP/IP (DoD) Models #cissp #osi #tcpip #dod #layer #layers #model
OSI to TCP/IP (DoD) Model Layers
OSI TCP/IP (DoD)
------------- -------------
Application Application
Presentation
Session
Transport Host-To-Host
@jcohen66
jcohen66 / cissp_cyber_kil_chain_examples.txt
Created May 25, 2024 22:07
CISSP Cyber Kill Chain Examples #cissp #cyber #kill #chain #ioc #ioa
Cyber Kill Chain Examples
IoC
- Indicator of Compromise
- Breadcrumbs left behind by threat actor
Top Indicators of Compromise
Unusual Outboud Network Traffic
- IoCs