finalzzz

Webinar 2

A recent webinar organized by C-SAFE on ‘Web Attack Detection Using IDPS: A Robust Approach by Shivam L. Sir to Strengthen Cybersecurity Defenses.'”

Page 1: Cybersecurity Concepts
Tools and Techniques:
Wireshark and VS Code: Used for scripting and network analysis.
SQL: Primary language utilized for database interactions.
Common-client: Used within an Ubuntu environment for certain tasks.
Bypass Techniques:
Encoding:
HTML Encoding in developer mode.
Base64 Encoding.
SQL Injection:
Using SQL queries and comments to exploit vulnerabilities.
Converting Base64 to JavaScript for analysis and attacks.
Q&A: Most Harmful Attacks:
SQL Injection: A severe attack affecting database integrity and security.
Cross-Site Scripting (XSS): Can manipulate entire web applications through

Page 2: Intrusion Detection and Response
Network Analysis Workflow:
Involves several stages:

Packet Decode: Interpreting raw data packets.
Pre-Processor: Initial filtering and preprocessing of data.
Detection Engine: Identifying malicious activity using rules.
Logging: Recording detected threats for further analysis.
Rules are crucial for identifying potential threats in network traffic.

IDS Rule Example:
Example of an Intrusion Detection System (IDS) rule:
plaintext
Copy code
action: alert
protocol: tcp
source IP: any
source port: 23
destination IP: 192.168.12.8
destination port: any
msg: “TCP Packet is detected”
sid: 2000020
Tools:
CyberChef: Used for data encoding, decoding, and manipulation.
Wireshark: For following network streams and deep packet inspection.
regex101.com: A web-based tool for regular expression pattern matching.
Payload exploration using document.cookie to test vulnerabilities.

bannerfinal

Webinar 1

Glimpse of first event of C-SAFE, featuring Mr.Dova Nani , a Scientific officer , NFSU GOA campus. sharing information on Forensic science.

Introduction to Forensic science:
Forensic Science is the application of scientific methods and techniques to investigate crimes and analyze evidence. It plays a key role in solving criminal cases by providing scientific proof in courts of law.

ROLE OF FORENSIC EXPERT & IO
Evaluation and Processing of the Crime Scene
A. Role of the First Officer Arriving on the Scene
B. Securing the Crime Scene
C. Crime Scene Survey
D. Crime Scene Documentation
i. Note-taking
ii. Photography
iii. Videography
iv. Sketching the Crime Scene
E. Searching Techniques at the Crime Scene
F. Collection, Packaging, Preservation of Evidence
G. Forwarding of the Evidence
H. Chain of Custody
I. Submission of Forensic