CompTIA Security+ Exam Notes

CompTIA Security+ Exam Notes
Let Us Help You Pass

Friday, September 26, 2025

Lock Picking Techniques Explained: Methods, Tools, and Pros & Cons

 Lock Picking - Need to know for Pentest+ exam

Lock picking is the practice of unlocking a lock by manipulating its components without using the original key. It’s commonly used in physical security assessments, locksmithing, and penetration testing. Here’s a detailed breakdown of the main methods of lock picking, especially for pin tumbler locks (the most common type):

1. Single Pin Picking (SPP)
Description: The most precise and controlled method.
Involves lifting each pin individually to the shear line using a hook pick while applying tension to the lock.
Pros: 
High success rate with practice.
Works on high-security locks.
Cons: 
Time-consuming.
Requires skill and patience.

2. Raking
Description: A faster, less precise method.
Uses a rake tool to scrub across the pins while applying tension, hoping to set multiple pins quickly.
Pros:
Quick and effective on low-security locks.
Great for beginners.
Cons:
Less effective on high-security or well-made locks.
Not always reliable.

3. Bumping
Description: Uses a specially cut bump key that fits the lock.
A light tap on the key causes the pins to jump, briefly aligning at the shear line.
Pros:
Fast and easy.
Works on many standard pin tumbler locks.
Cons:
Requires a bump key for each lock type.
Noisy and can damage the lock.

4. Impressioning
Description: Involves inserting a blank key and manipulating it to create marks from the pins.
These marks guide the cutting of a working key.
Pros:
Creates a usable key.
Useful for covert entry.
Cons:
Time-consuming.
Requires skill and specialized tools.

5. Decoding
Description: Used on combination locks or locks with visible mechanisms.
Involves reading or measuring the lock’s internal configuration to determine the correct combination or key cuts.
Pros:
Non-destructive.
Useful for padlocks and safes.
Cons:
Limited to specific lock types.
Requires specialized knowledge.

6. Bypassing
Description: Avoids the lock mechanism entirely.
Uses tools to directly manipulate the latch, cam, or locking mechanism.
Pros:
Fast and effective.
Works on poorly designed locks.
Cons:
Doesn’t work on all locks.
May require access to the lock’s internals.

7. Using a Plug Spinner
Description: Used after picking a lock in the wrong direction.
Spins the plug quickly to the correct direction without resetting the pins.
Pros:
Saves time if the lock was picked backward.
Cons:
Only useful in specific situations.


Thursday, September 25, 2025

Hiren’s BootCD PE: The Ultimate Windows Recovery Toolkit

 Hirens Boot CD PE

What Is Hiren’s BootCD PE?
Hiren’s BootCD PE (Preinstallation Environment) is a modern, bootable recovery toolkit based on Windows PE (Preinstallation Environment). It is designed to help users diagnose, repair, and recover Windows systems that are unbootable, infected, or otherwise malfunctioning 1 2.

Key Features and Capabilities

1. Windows PE-Based Environment
  • Runs a lightweight version of Windows (Windows 10 or 11 PE).
  • No installation required — boot directly from a USB or CD/DVD.
  • Supports both Legacy BIOS and UEFI systems.
2. Comprehensive Toolset

Includes a wide range of free and legal utilities for:
  • System repair and diagnostics
  • Disk imaging and cloning
  • Partition management
  • Password recovery
  • Malware scanning
  • Data recovery
  • Remote access and networking
Examples of Included Tools:
  • MiniTool Partition Wizard, Macrium Reflect, AOMEI Backupper
  • Malwarebytes, Recuva, NirSoft Utilities
  • TeamViewer, FileZilla, PuTTY, Firefox
3. Driver Support
  • Automatically installs drivers for graphics, sound, Wi-Fi, and Ethernet.
  • Designed to work on modern hardware with at least 4 GB of RAM 1.
Use Cases
  • Fixing boot errors or corrupted Windows installations
  • Recovering lost data from damaged or formatted drives
  • Resetting forgotten Windows passwords
  • Cloning or backing up disks
  • Running antivirus scans on infected systems
  • Accessing files remotely or transferring data
How to Use Hiren’s BootCD PE

Step-by-Step:
1. Download the ISO from the official Hiren’s BootCD site 1.
2. Use a tool like Rufus to create a bootable USB drive.
3. Boot your computer from the USB (change boot order in BIOS/UEFI).
4. Use the graphical interface to launch tools and perform recovery tasks.

Advantages
  • No installation required
  • Free and actively maintained
  • Supports modern hardware
  • Ideal for IT professionals and DIY users

Active@ KillDisk: The Ultimate Tool for Data Wiping and Drive Sanitization

 Active KillDisk

What Is Active@ KillDisk?
Active@ KillDisk is a powerful, portable data erasure tool designed to permanently erase data on storage devices, including HDDs, SSDs, USB drives, and memory cards. It ensures that deleted files and folders cannot be recovered, even with advanced forensic tools 1.

Key Features
1. Secure Data Erasure
  • Supports one-pass and multi-pass wiping methods, including standards such as DoD 5220.22-M and Gutmann Method 2.
  • Overwrites every sector of the drive with patterns (e.g., zeroes or random data), making recovery impossible.
2. Wide Device Support
  • Works with hard drives, solid-state drives, USB flash drives, and even dynamic disks.
  • Can be run from a bootable USB/CD/DVD, allowing erasure of system drives without OS interference 2.
3. Advanced Disk Inspection
  • Includes a Disk Viewer for low-level inspection.
  • Displays SMART data for disk health monitoring 1.
4. Verification and Logging
  • Generates detailed logs and certificates of erasure.
  • Offers verification options to confirm successful wiping 2.
5. Customizable Options
  • Select specific areas to wipe: unused clusters, slack space, and system metadata 3.
  • Supports auto shutdown, sound notifications, and custom labels after completion.
User Experience
  • Available in GUI and console versions.
  • Offers dark mode, context help, and support for low-resolution monitors.
  • Can be configured to skip confirmation prompts for faster operation (use with caution) 3.
Considerations
  • Wiping can be time-consuming, especially with multi-pass methods.
  • Boot sector and MBR initialization may be required post-erasure to reuse disk 3.
  • Verification adds time but improves assurance of complete data destruction.
Real-World Use Case
  • A user tested KillDisk on a 16GB flash drive:
  • After a simple format, recovery tools could retrieve deleted files.
  • After using KillDisk’s One Pass Zeroes method, recovery tools found only gibberish or empty metadata.
  • A Hex check confirmed all sectors were overwritten with zeroes 2.
Summary
Active@ KillDisk is ideal for:
  • Data sanitization before disposing of or reselling devices.
  • Enterprise environments require compliance with data destruction standards.
  • Tech enthusiasts seeking reliable, customizable erasure tools.

Modular Power Supplies: Benefits, Features, and Comparison with Other PSU Types

 Modular Power Supply


A modular power supply is a type of computer power supply unit (PSU) designed to offer flexibility, improved airflow, and easier cable management by allowing users to attach only the cables they need. Here's a detailed breakdown of its benefits:

1. Improved Cable Management
  • Customizable cabling: You only connect the cables required for your specific components.
  • Less clutter: Reduces excess cables inside the case, making it easier to organize.
  • Cleaner builds: Ideal for showcasing builds in transparent or open cases.
2. Better Airflow and Cooling
  • Fewer cables mean less obstruction to airflow.
  • Improved airflow helps maintain lower internal temperatures, thereby enhancing system stability and longevity.
3. Easier Maintenance and Upgrades
  • Quick component swaps: You can easily disconnect and reconnect cables without disturbing the entire setup.
  • Simplified troubleshooting: Easier to isolate and test individual components.
4. Aesthetic Appeal
  • A clean, minimal cable layout enhances the visual appeal of custom builds.
  • Often preferred by PC enthusiasts and gamers who value presentation.
5. Scalability and Flexibility
  • Modular PSUs are ideal for future upgrades — just add new cables as needed.
  • Supports a wide range of configurations, from basic setups to high-performance gaming or workstation builds.
6. Reduced Electrical Interference
  • Fewer cables can mean less electromagnetic interference (EMI), which may improve signal integrity for sensitive components.
7. Simplified Installation
  • Installing a modular PSU is generally easier, especially in tight cases, since you’re not forced to work around unused cables.
Modular vs. Semi-Modular vs. Non-Modular



802.1Q VLAN Tagging: How Ethernet Frames Enable Network Segmentation

 802.1Q VLAN Tagging

What is IEEE 802.1Q?
IEEE 802.1Q is a networking standard that defines Virtual LAN (VLAN) tagging on Ethernet frames. It allows multiple VLANs to coexist on a single physical network link by inserting a tag into Ethernet frames to identify which VLAN the frame belongs to.

Purpose of 802.1Q
The primary objective of 802.1Q is to facilitate network segmentation and traffic isolation without necessitating separate physical switches or cabling for each VLAN. This improves:
  • Security
  • Performance
  • Manageability
How 802.1Q Works

1. VLAN Tagging
802.1Q adds a 4-byte tag to the Ethernet frame between the source MAC address and the EtherType field. This tag includes:
  • Tag Protocol Identifier (TPID): 2 bytes, always set to 0x8100 to indicate a VLAN-tagged frame.
  • Tag Control Information (TCI): 2 bytes, containing:
    • Priority Code Point (PCP): 3 bits for QoS (Quality of Service)
    • Drop Eligible Indicator (DEI): 1 bit for congestion management
    • VLAN ID (VID): 12 bits identifying the VLAN (range: 0–4095; 0 and 4095 are reserved)
2. Trunk Links
802.1Q is commonly used on trunk ports — switch ports that carry traffic for multiple VLANs. The tag tells the receiving switch which VLAN the frame belongs to.

3. Native VLAN
Frames belonging to the native VLAN are not tagged. This is used for backward compatibility with devices that don’t support VLAN tagging.

Example Frame Structure (Tagged)
| Destination MAC | Source MAC | TPID (0x8100) | TCI (PCP + DEI + VLAN ID) | EtherType | Payload | CRC |

Benefits of 802.1Q
  • Efficient VLAN management across switches
  • Improved security by isolating traffic
  • Scalability for large networks
  • Support for QoS via PCP bits
Considerations
  • All switches must support 802.1Q for VLAN tagging to work across the network.
  • Misconfigured native VLANs can lead to security vulnerabilities (e.g., VLAN hopping attacks).
  • VLAN ID 1 is often the default and should be changed for security reasons.

Zed Attack Proxy (ZAP): The Open-Source Toolkit for Web Security Testing

 Zed Attack Proxy (ZAP)

Zed Attack Proxy (ZAP) is a free, open-source security tool developed by the Open Web Application Security Project (OWASP). It is widely used for penetration testing and vulnerability scanning of web applications. ZAP is designed to be easy to use for beginners while still offering advanced features for experienced security professionals.

Overview of ZAP
  • Full Name: OWASP Zed Attack Proxy
  • Purpose: Web application security testing
  • Platform: Cross-platform (Windows, macOS, Linux)
  • Interface: GUI, CLI, and API
  • License: Open-source (Apache License 2.0)
Key Features
1. Intercepting Proxy
ZAP acts as a man-in-the-middle proxy, allowing testers to intercept, inspect, and modify HTTP(S) traffic between the browser and the web application.

2. Automated Scanner
ZAP can automatically scan a target web application for common vulnerabilities such as:
  • SQL Injection
  • Cross-Site Scripting (XSS)
  • Broken Authentication
  • Security Misconfigurations
3. Passive and Active Scanning
  • Passive Scan: Observes traffic without altering it, identifying issues like missing security headers.
  • Active Scan: Probes the application actively by sending crafted requests to discover vulnerabilities.
4. Spidering
ZAP can crawl a website to discover all its pages and endpoints using:
  • Traditional Spider: Parses HTML and follows links.
  • AJAX Spider: Uses a headless browser to interact with JavaScript-heavy sites.
5. Fuzzer
Allows custom payloads to be sent to parameters to test for vulnerabilities, such as buffer overflows or input validation issues.

6. Session Management
ZAP supports authentication mechanisms (e.g., cookie-based, token-based) and can maintain sessions during testing.

7. Scripting Support
ZAP supports scripting in languages like JavaScript, Python, and Zest for custom test cases and automation.

8. API Access
ZAP provides a REST API for integration with CI/CD pipelines and automation tools.

Typical Use Cases
  • Security assessments of web apps
  • Training and education in web security
  • Integration into DevSecOps pipelines
  • Reconnaissance and vulnerability discovery
User Interface
ZAP offers:
  • Graphical UI: Ideal for manual testing and visualization.
  • Command-line interface (CLI): Useful for automation.
  • Docker images: For containerized deployments.
Common Vulnerabilities Detected
  • Cross-Site Scripting (XSS)
  • SQL Injection
  • CSRF (Cross-Site Request Forgery)
  • Directory Traversal
  • Insecure Cookies
  • Missing Security Headers
Getting Started
1. Download ZAP from OWASP ZAP official site
2. Configure the browser proxy to route traffic through ZAP
3. Start intercepting and scanning your target application
4. Review alerts and reports for discovered vulnerabilities

Sunday, September 21, 2025

FIPS 140-3: Cryptographic Module Security Requirements

 FIPS 140-3 (Federal Information Processing Standard Publication 140-3)

FIPS 140-3 (Federal Information Processing Standard Publication 140-3) is a U.S. and Canadian government standard that defines security requirements for cryptographic modules—the hardware, software, or firmware that performs encryption, decryption, key management, and other cryptographic functions. It was published by NIST in 2019 and supersedes FIPS 140-2 1.

Purpose and Scope
FIPS 140-3 ensures that cryptographic modules used to protect sensitive information meet rigorous security standards. It applies to:
  • Federal agencies
  • Contractors working with federal systems
  • Private sector organizations (e.g., banks, healthcare, SaaS providers) that handle sensitive data or want to meet procurement requirements 2.
Key Components of FIPS 140-3
FIPS 140-3 builds on international standards ISO/IEC 19790:2012 and ISO/IEC 24759:2017 and includes:

1. Cryptographic Module Specification
  • Defines the module’s architecture, cryptographic algorithms, key sizes, and operations.
2. Module Interfaces and Ports
  • Specifies how the module connects to other systems and ensures secure data flow.
3. Roles, Services, and Authentication
  • Defines user roles (e.g., admin, operator) and access controls.
4. Software/Firmware Security
  • Ensures secure coding practices and protection against tampering.
5. Operating Environment
  • Addresses the security of the OS or platform hosting the module.
6. Physical Security
  • Includes tamper-evidence, tamper-resistance, and environmental protections.
7. Sensitive Security Parameter (SSP) Management
  • Covers secure handling of keys and other sensitive data.
8. Self-Tests
  • Modules must perform startup and conditional tests to verify integrity.
9. Life-Cycle Assurance
  • Ensures secure development, deployment, and maintenance.
10. Mitigation of Other Attacks
  • Addresses side-channel attacks, fault injection, and other advanced threats 1 3.
Security Levels
FIPS 140-3 defines four security levels, each increasing in rigor:
  • Level 1: Basic security; software-only modules allowed.
  • Level 2: Adds role-based authentication and physical tamper-evidence.
  • Level 3: Requires identity-based authentication and physical tamper-resistance.
  • Level 4: Highest level; protects against environmental attacks and advanced threats.
Validation Process
Validation is conducted through the Cryptographic Module Validation Program (CMVP), jointly run by NIST and the Canadian Centre for Cyber Security. The process includes:

1. Pre-validation: Internal assessments and documentation.
2. Testing: Performed by accredited labs; includes penetration testing and algorithm verification.
3. Post-validation: Ongoing monitoring, updates, and revalidation if changes occur 3.

Why It Matters
  • Trust: FIPS validation is often a baseline requirement for government and enterprise contracts.
  • Security: Ensures cryptographic modules are robust against modern threats.
  • Compliance: Helps meet regulatory requirements (e.g., HIPAA, FedRAMP, PCI-DSS).
  • Global Alignment: Harmonizes with international standards for broader applicability 2.