This is a good link to describe DFARS 252.204-7012, which is the set of security requirements that all DoD contracts must follow:
If you have an Android phone, Google likely has a history of most of the places that you have been over the past 10 years. You can view that history by signing onto your Google account (via Gmail, etc.) and then going to:
Under location history, click “View Timeline.” A map will appear with dots showing where you have been. Based on my map, it appears that the history may only include locations within the United States and Canada. And there are missing places. But, the accuracy of the information displayed is quite refined. For example, I can zoom into a location I visited on a business trip a few years ago and can tell the hotel I stayed at. I can tell when I arrived at the hotel for the evening and when I left for the airport the next morning.
This location tracking is turned on by default on Android devices. It can be turned off in theory. But, it is entirely possible that Google collects and retains this information anyway.
Here is the official link to the TL-WR802N router that I purchased in November 2018. Note that this router comes with a highly insecure default configuration. With some simple cracking tools in Kali Linux, I was able to obtain its login name and password in under one minute…
Nevertheless, Open-WRT and DD-WRT can be installed on it to provide a more secure system.
Here is a PDF version:
The links below are to hardware devices that can be useful for penetration testing:
Personal Firewall is a tidy little set of scripts for implementing a pretty tight firewall on a machine that is connecting to an open (or otherwise untrusted) network. It is a set of scripts for allowing a minimal set of traffic (HTTP, DNS, DHCP, NTP, etc) immediately and then save the configuration to be persistent upon reboot.
Of course, add or delete services you do not need. For example, do you need Skype? If not, delete the Skype configuration from the script.
This link also contains a script to convert URLs to CIDR addresses. For example, the script will identify the IP address ranges of an unwanted website so that you can block it with the Personal Firewall.
The Personal Firewall uses iptables. So, it only works on a Linux machine. However, it could be of use for a home router running a Linux based firmware build such as OpenWRT.
Chocolatey is a package manager for Windows (like apt-get or yum but for Windows). It is a single, unified interface designed to easily work with all aspects of managing Windows software (installers, zip archives, runtime binaries, internal and 3rd party software) using a packaging framework that understands software versions as well as dependencies.
Chocolatey packages encapsulate everything required to manage a particular piece of software into one application by wrapping installers, executables, zips, and scripts into a single package. This makes applications easy to install. It simplifies the process of checking for updates. And it makes installing those updates easy. Installing updates on a regular basis is crucial for maintaining the security of your Windows machine.
Thousands of packages are available through Chocolatey. Most, if not all, of them are free and open source.
Open a command prompt in Windows under administrator privileges:
Copy and paste the following command into the command prompt:
@”%SystemRoot%\System32\WindowsPowerShell\v1.0\powershell.exe” -NoProfile -InputFormat None -ExecutionPolicy Bypass -Command “iex ((New-Object System.Net.WebClient).DownloadString(‘https://chocolatey.org/install.ps1’))” && SET “PATH=%PATH%;%ALLUSERSPROFILE%\chocolatey\bin”
After the installation finishes, type the following into the command prompt:
choco upgrade chocolatey
Finally, type the following into the command prompt if you want to use the GUI interface:
choco install chocolateygui
The installer will ask if you want to run the script. The answer is Yes.
Once the installation has completed, close the command prompt. Chocolatey should now be visible on your Start menu.