#### **TRACING STACK** 👇 ![TRACING STACK](https://hackmd.io/_uploads/rJikas9dh.png) **EFI** is **Extensible Firmware Interface** #### [Term “Zero Trust Architecture”](https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/) ... means a **security model, a set of system design principles, and a coordinated cybersecurity and system management strategy based on an acknowledgement that threats exist both inside and outside traditional network boundaries.** The Zero Trust security model eliminates implicit trust in any one element, node, or service and instead **requires continuous verification of the operational picture via real-time information from multiple sources** to determine access and other system responses. In essence, a Zero Trust Architecture **allows users full access but only to the bare minimum they need to perform their jobs.** If a device is compromised, zero trust can ensure that the damage is contained. The Zero Trust Architecture security model assumes that a breach is inevitable or has likely already occurred, so it constantly limits access to only what is needed and looks for anomalous or malicious activity. Zero Trust Architecture **embeds comprehensive security monitoring; granular risk-based access controls; and system security automation in a coordinated manner** throughout all aspects of the infrastructure in order to focus on protecting data in real-time within a dynamic threat environment. This data-centric security model allows the concept of least-privileged access to be applied for every access decision, where the answers to the questions of who, what, when, where, and how are critical for appropriately allowing or denying access to resources based on the combination of sever. ![0TRUST PILLARS & Capabilities](https://hackmd.io/_uploads/rkWqf2cun.png) #### ⇾ OSI vs TCP/IP Model ![OSI vs TCP/IP Model](https://hackmd.io/_uploads/rkco-3quh.png) #### :crossed_swords: OSI & related Attacks :crossed_swords: ![OSI & related Attacks](https://hackmd.io/_uploads/S1duY25_h.png) #### :video_game: PIXELS explained :laughing: ![PIXEL](https://hackmd.io/_uploads/BJAgGh5dn.png) #### ⇾ Sys Calls w/Stream Sockets ![Sys Calls -Stream Socket](https://hackmd.io/_uploads/rkliBnq_h.png) #### :arrow_down: gRPC vs REST vs GraphQL ![](https://hackmd.io/_uploads/BJYDI2q_2.png) #### ⇒ Micro Services ![](https://hackmd.io/_uploads/Sycx_n5u2.png) #### ⇉ HTTPS ![HTTPS](https://hackmd.io/_uploads/HkaV_3cuh.png) #### IT Sec Acronyms ![IT Sec Acronyms](https://hackmd.io/_uploads/HkiFO2qdh.png) #### Linux commands ![cmds](https://hackmd.io/_uploads/B1Xpq3q_2.png) ### **GitHub remote repo :** ***Grab the remote URL, add it to your local git remote, and push to GitHub.*** ```shell= $ git remote add origin git@github.com:GANitak/[name-of-remote-repo].git $ git add . $ git commit -am “first commit” $ git push origin main ``` #### Clean bash :: by Kris Nóva ***warning : don't put this into the .bashrc → will delete everything in your ~/ (this goes for Firefow settings too)*** ```bash= #!/bin/bash # Copyright o 2022 Kris Nova <kris@nivenly.com> # # Licensed under the Apache License. Version 2.0 (the License): # you may not use this file except in compliance with the License # You may obtain a copy of the License at # # http:#www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS. # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied # See the License for the specific language governing permissions and # limitations under the License mv -v ~ /tmp 2> /dev/null mv -v.tar.gz /tmp 2> /dev/null mv -v .zip /tmp 2> /dev/null mv -v.png /tmp 2> /dev/null mv -v .JPG /tmp 2> /dev/null mv -v.JPEG /tmp 2> /dev/null mv -v .jpg /tmp 2> /dev/null mv -v.jpeg /tmp 2> /dev/null mv -v .pdf /tmp 2> /dev/null mv -v.docx /tmp 2> /dev/null mv -v #* /tmp 2> /dev/null ``` ![](https://hackmd.io/_uploads/rJ7JJVjuh.png) ![](https://hackmd.io/_uploads/H1G_lVsun.png) /run/media/ganitak/Arch_xSSD $ is the path check what a module is for with : 'modinfo' e.g : modinfo wd719x grep 'preset\|WARNING' mkinit.output ```shell= as non-root&root@$ grep: mkinit.output: No such file or directory ``` MAKE IT EASY TO WORK WITH PEOPLE: https://hammertime.cyou/ ### Commands to create executable link ```shell= sudo ln -s /whole/path/to/script.extension /bin/weather ``` - This will create a symlink into the **/bin/** folder, which is included in *everyone's PATH*. If it requires sudo to run, I recommend placing it in **/sbin** instead of **/bin.** ### The GNU tar (short for Tape ARchiver) ![](https://hackmd.io/_uploads/S1fOQejYn.png) ![](https://hackmd.io/_uploads/B1o57ejth.png) #### To Extract From tar.gz Archive - Use the -z option to extract a tar.gz file: ```shell= tar xzf <archive name>.tar.gz ```