Key element within the set of tools in cyber defense is an early warning system as of Honeypots. Honeypots simulate vulnerable systems or services and trap threat actors, which help estimate their behavior to strengthen the deployed defensive strategy. In this study, we deploy honeypot sensors in Beirut to understand the cyber-attacks that roam around the Lebanese perimeter. Here, the main goal is to detect automated attacks where threat actors apply large scans to identify vulnerabilities and exploit these. The analytics showed that more than 2,500,000 attacks had been performed within 21 days.
Read MoreWith the aim of ensuring a safe online affair in Lebanon, the Cybersecurity Empowering Research Team (CERT) is targeting to check Lebanese IT infrastructure for security and to notify their owners in case any vulnerability was found. To this end, researchers in Lebanon CERT developed a cutting-edge workflow to address the security issues of online services in Lebanon. This article will focus on the first step of the workflow, namely, the collection of domain names and emails of Lebanese companies.
Read MoreEarly 2019 a group of Lebanese security experts from various sectors had a chance to meet and share their concerns about evolved cyber security threats and their direct impact to homeland country. They volunteered to take a step further in provisioning their collaborative expertise to launch the Lebanon CERT team. Our story and mission.
Read MoreA fourth empirical study conducted by the Cybersecurity Empowering Research Team in the second semester of 2021 revealed 761 low-hanging critical vulnerabilities. These affects the majority of the lebanese sectors, including critical infrastructure. The corresponding 761 vulnerable information systems can be easily hacked by a novice hacker to have full control over these systems.
Read MoreIn our first paper, we uncover 1645 critical vulnerabilities in the perimeter of Lebanon affecting the majority of its sectors, including critical infrastructure. Given the enormous economic and personal damage imposed by critical vulnerabilities, we use a novel framework to regularly identify these vulnerabilities on a large scale within hours.
Read MoreA third empirical study conducted by researchers from the Cybersecurity Empowering Research Team in Q2 2021 revealed 976 low-hanging critical vulnerabilities. These affects the majority of the lebanese sectors, including critical infrastructure. The corresponding 976 vulnerable information systems can be easily hacked by a novice hacker to have full control over these systems.
Read MoreA second empirical study conducted by researchers from Lebanon Cybersecurity Empowering Research Team in Q4 2020 revealed 653 low-hanging critical security vulnerabilities. These affects the majority of the lebanese sectors, including critical infrastructure. The corresponding 653 vulnerable information systems can be easily hacked by a novice hacker to have full control over these systems.
Read MoreOne of the essential steps for hackers or penetration testers before taking over a system or an infrastructure is to get full knowledge about it. This is what so called a reconnaissance phase which can be performed either passively or actively to collect information about the target through various information gathering mechanisms. Port scanning using tools like zmap is an effective active reconnaissance method due to its speed and simplicity to clearly map the intended target. In this writing, we will demonstrate some of the zmap tool capabilities that helps gathering interesting information.
Read More