You are on page 1of 2

Cyber security what I have learnt

Cyber attacks

https://www.stationx.net/canarytokens/ making traps making worms

WEB WORMS AND HOW TO TRACK A HACKER

Techspot.com/guides/router ip addresses

Route –n ip config default ip address is roter address

Firewalls on roters iptables –L

Shodan.io search router vulnerability like google search engine

Give router names and search open ports…

Techmonkeys.co.uk/hackcheck

Qualys.com free scan for roters and fixing and patching and remove if any services open… to check
vulnerabilities

Firmware is os of router..

Custom firmware are good for getting security like ip tables , vpn , traffic monitoring …. Standard is
limited and very compromised

To install custom firmware take a list from wiki google…

Download and upload from admin console by performing router upgrade by flashing router. Matching
right firmware with router is important

Openwrt.org is embedded system lik linux and this custom firmware used in many cams ,iot, printers,
linux kernel, routers to route internal traffic this is used .

Busybox.net contains many common executables which is optimized to get these logs in upload in many
home routers compatible firmware.

dd-wrt.com check router compatible router firmware ……

myopenrouter.com to check links of firmware where you find according to router model

by custom router you can run tor , you can setup vpn client and route all traffic through vpn ,
pfsense.com is another firewall secured router firmware to buy
firewalls
it is configured to allow traffic for specific ip addresses through ports .

every device has their own firewalls these are call host based firewalls

egress/outbound filtering to use network based firwalls to communicate to stop the RAT

, file encryption by using malware like reverse connection by running code.. which is called shell code to
take a control of sytem or device.

How to create reverse shell code

Pentestmonkey.net created in various diff languages like bash ruby php python

Only be malwared by outbound connection of firewall .

You might also like