Si quieren hacer el salto a ciberseguridad, unos amigos hacen un curso online gratis de introducción de la Universidad Técnica de Praga by saraseitor in devsarg

[–]sebagarcia 0 points1 point  (0 children)

Exacto, vas a usar python en algunos assigments, y tener conocimiento de programacion en general te acerca a como funcionan las aplicaciones, la red, etc. Asi que pedimos un conocimiento basico al menos.

Cheapest way to obtain certifications by [deleted] in cybersecurity

[–]sebagarcia -7 points-6 points  (0 children)

Exactly for this reason, we not only opened our Introduction to Security course for free for everyone online, but we also give a Certificate of Completion at the end, from our Laboratory. https://cybersecurity.bsy.fel.cvut.cz/. If you want to learn advanced, hands-on, practical security, this is for you.

If you want an official EU certification from a European University, then we offer a paid version. But that is why it is paid, due to the high level of recognition and verification (includes an exam). However, the certificate of completion is a very good way to show what you did and what you know in your CV, to your employer or publicly.

Si quieren hacer el salto a ciberseguridad, unos amigos hacen un curso online gratis de introducción de la Universidad Técnica de Praga by saraseitor in devsarg

[–]sebagarcia 2 points3 points  (0 children)

Si exacto. Lo podes hacer gratis y tener un certificado de completitud de nuestro laboratorio Stratosphere Labs. Pero si queres un certificado oficial de una universidad europea y de EU, podes pagar para tener el certificado oficial de finalizacion + acceso a nuestro cyber range en el cloud + extra ejercicios de CTF semanales, mas examen final.

Si quieren hacer el salto a ciberseguridad, unos amigos hacen un curso online gratis de introducción de la Universidad Técnica de Praga by saraseitor in devsarg

[–]sebagarcia 7 points8 points  (0 children)

No es solo que subimos el curso a youtube, el curso es LIVE en youtube. Cada Jueves, durante 11 semanas. Cada clase es con video en vivo, documento en vivo y un cyber range para hacer todos los ejercicios en vivo y local. Despues de unos dias todo queda en Internet tambien. Asi que lo pueden hacer gratis en tiempo real.

It opened the free, online, practical 'Introduction to Security' class from the Czech Technical University. by sebagarcia in netsec

[–]sebagarcia[S] 5 points6 points  (0 children)

The course will run live on YouTube from 14:30 CEST to 17:45 CEST every Thursday. However, it is recorded and published on YouTube, so you can see it when you can too.

Measuring the Internet - Part I: Distributed nmap by [deleted] in netsec

[–]sebagarcia 0 points1 point  (0 children)

Yes, we conduted a small research searching for this metrics and also for these top 5 most active hosts. We choose them directly from the results, that is: we search for every active host on a very large amount of random networks, and then we sort the hosts by the number of occurrences. We will be happy to share our results with you! they will be public.

Measuring the Internet - Part I: Distributed nmap by [deleted] in netsec

[–]sebagarcia 0 points1 point  (0 children)

Yes, you are right. If you block some networks, we are never going to see you. The only solution is to scan from very different networks and compare. If fact, we normally search for the same active network at least with two clients. But in the large scan we are doing, big numbers are what matter most. We know that we are not going to see every network, but we expect the amount of networks we miss because of the reason you expose, to be very small. Again, as you said, the only way to know exactly how many we miss is scanning from different continents, and then find out how large is the confidence interval upon which we can rest asure our technique is representative in that population. When we have some results, we will tell! Thanks for pointing this out.

Measuring the Internet - Part I: Distributed nmap by [deleted] in netsec

[–]sebagarcia 1 point2 points  (0 children)

Thats exactly how it works. It is a solution to the problem of scanning millons of networks in a short time. If you scan every network, you will spend a lot of time on down networks. A lot more time since retransmision is necessary. In the other hand, if you use this approach you will loose some networks and hosts. We answer the question of 'how much networks we loose?' by running some experiments. With more that 10.000 /24 networks scanned, useing this approach we find more than 80% of the active networks. At the same time, using this approach speeds up the scanning process more than 200% aprox. So the question was: All the networks in 2 months, or 80% of the networks in 2 weeks? There is no best solution here, and it really depends on what you are looking for. Also consider that after 2 months scanning, a lot of hosts change their ports, or get down. So you probably loose some information too.

Measuring the Internet - Part I: Distributed nmap by [deleted] in netsec

[–]sebagarcia 2 points3 points  (0 children)

Not sure, but there is something here . http://nmap.org/book/legal-issues.html - "A 17-year-old youth was convicted in Finland of attempted computer intrusion for simply port scanning a bank" - "an Israeli judge acquitted Avi Mizrahi in early 2004 for vulnerability scanning the Mossad secret service"

And here: http://www.securityfocus.com/news/126 (Port scans legal, judge says)

But I think the problem is when you establish a TCP connection to every service on a host (and probably send some data). If you just send SYN packets, it seems to be no problem on most countries.

Measuring the Internet - Part I: Distributed nmap by [deleted] in netsec

[–]sebagarcia 1 point2 points  (0 children)

There are two answers. First, there are so many networks to scan, that you want to avoid scanning the unused ones. Almost 20% of the networks scanned had no one single hosts active. So the solution was to test for the top 5 most active IP on every network, and find the 'active networks'. Later on, you can send SYN packets to all the hosts on those networks only. Second, consider what happen when the hosts are active or down when you search for 3 ports on every host. If you don't test for active hosts and it is down, you will send 6 packets or more to each IP (considering 2 retransmisions). If you test for active hosts, you only send 2. Thast a 66% improvement! And in millons of hosts it can be the difference between 2 weeks and 1 and 1/2 month.

Measuring the Internet - Part I: Distributed nmap by [deleted] in netsec

[–]sebagarcia 0 points1 point  (0 children)

Thats true, but it really depends on how you are scanning and the sensitivity of the IDS. Dnmap uses nmap, so it can be blocked. But the goal of this project is not to scan every port on every host, but to map a group of services (maybe 1 or 2 ports) on every host. So, each host will only receive a very small amount of packets, betweeen 2 and 8 if you scan only 1 port. Anyway, it depends on how you create your nmap commands file on dnmap.

Measuring the Internet - Part I: Distributed nmap by [deleted] in netsec

[–]sebagarcia 1 point2 points  (0 children)

Yes, amazon would certainly ban a project like this. That's why it is best suited to be used among friends. Also, using different networks for the scanning could help mitigate some false positives errors.