Mrs. King - School Year 2010-2011

Friday, September 4, 2020

Kriegsspiel: Big Trouble In Little Lardas

Two weeks ago, I participated in a week-long online Kriegsspiel run by Nick Skinner and Richard Clarke of Too Fat Lardies fame. With a total of 13 participants, two umpires and one observer, it was quite an undertaking. Set within a fictional "Imaginations" campaign of the "Lard War II," the players commanded either the forces of the Kingdom of Blue or the Red Republic. As Nick explained in the game:




Blue has invaded Red and achieved a breakthrough in the central South. Blue's armies are now pushing Northwards towards the crucial line of the NEMUNAS river and the strategically important city of LARDAS that stands at the confluence of two rivers. If they can push on, they will be threatening the capital city of REDBURG. Red forces though are well organised and aware of the danger. What will happen next?
For the participants, the planning portion was the meat and potatoes of the game. We started out by signing into a website and associated app called Discord. Nick set up a server and we joined it. We were immediately assigned to either the Blue or Red force rooms. From there we received our unit assignments and awaited orders. 

The Blue forces, of which I was a member, consisted of an airborne division. We had as players the commanding general, chief of staff, two para brigade commanders, a special reconnaissance squadron commander, a divisional artillery battalion commander and me. I was assigned as the commander of a brigade of glider troops.

Speaking of gliders. This film and the real events it represents may have provided may have provided some inspiration.
We confirmed that our organization and equipment was vaguely British. That meant I had three battalions of infantry, each with four companies of four platoons plus a support company. I was also assigned an ambulance company. This seemed a bad omen.

In the background, Nick was briefing the division commanding general and chief of staff with the division mission. A day or so later, after the CG and COS had some time to digest the mission, we received our unit missions. My mission in particular was to neutralize four forts that protect the southern flank of the city and conduct a follow on mission of clearing the two main routes to the city.

The small circles are my objectives, the forts. The larger circles are the landing zones for the gliders. The red areas? Anti-glider poles. To quote a certain British officer, "I'm thinking of a phrase that rhymes with 'plucking bell'." Umpire Nick Skinner took  an actual 1:50,000 map and appended new place names, grid line identifiers and other information.

Early in the plans process, I chose to land my initial assault gliders directly on the forts. I figured my best chance was to take the enemy completely by surprise and jump right on top, like at Eben Emael. I had limited resources to get my brigade on the ground. It would take three lifts over the course of two days to get my complete brigade into the battle area. Given my resources at hand, on the initial landings, I would have 20 platoons out of 48 on the ground. Not great odds, I thought. But I had to risk it. Who dares, wins, right?

Plans were set, then changed and changed again as the brigade commanders weighed options and made their cases with the CG and COS for why they should get resources. A feature of Discord that we found handy are voice chat rooms where members can talk via VOIP for planning, rock drills, etc. Blue had two conferences and we found them very beneficial. By the time we had our first conference, we had our plan largely in place and were discussing some of the finer points. The final conference was to make sure everybody had their plans finalized and ask final questions.

My set up for the day of battle. The cards have each lift marked on them with the units and target LZ. As the battle progressed, I put the markers on the map as needed. We didn't get past the first lift on Day 1, although we planned for four days.

The day of battle arrived. 
As time drew closer for us to climb in our imaginary planes and gliders, top level rooms were locked up and player-to-player communications stopped. We sat at our computers waiting for H-Hour. I received a message that I was on the ground at LZ Baker and could see paras taking heavy fire about a kilometer to the northeast. I could also see and here vicious combat in Fort 2, aka OBJ Grumpy. Then the various communication nets started going live in the form of restricted chat rooms in Discord.

My brigade net room was where I spoke with umpires to get reports from my battalions and request info from them. There was an "on the ground" room for commanders that were up on the division net. Finally there was a division HQ room for those who had established comms with the outside world. Receiving information, parsing it, confirming our own assumptions and then assessing it before putting it up in both the "on the ground" room and Division room was a significant challenge. Luckily, the game was set to last only three hours. 

During the game, we were mostly interacting with the umpires and relying on them for information. Issuing orders and requests for information from my imaginary subordinates. I then had to process that info and relay it to my in-game superiors. But only once our in-game communication nets were established! One of the para commanders didn't have comms because his radios got shot up on the DZ. He had to "walk" to where I was and then we could talk to each other and the had to use my "radios" to talk to higher.

Fort 1, OBJ Bashful was taken almost immediately with 30% casualties. Fort 2, OBJ Grumpy, fell only after receiving help from a platoon that had landed on Bashful. Fort 3, OBJ Dopey, was a see-saw battle and I tried mustering forces from Bashful and Grumpy to push it over the edge. Fort 4, OBJ Sleepy, only reported in once their ammo was all expended and the last holdouts were cornered in a bunker and calling "God save the King."

Enemy armored infantry and self-propelled guns had been spotted in the vicinity of Sleepy, so I called for air strikes on the fort with machine gun and cannon only, then follow up with bombs and rockets on the enemy vehicles. Imagine my surprise when I received the report that Sleepy had been destroyed from the air.

In the meantime, I was still trying to get enough forces scratched together to make a difference at Dopey to find it had fallen and was being evacuated, my troops being led away by the enemy. When I asked for clarification if it was Sleepy or Dopey, i was told, "No, it's Dopey, dopey!" Thanks, Rich.

Then the game ended. Luckily, our troops were wholly imaginary and our decisions didn't result in any real casualties. It was an exhilarating, exhausting, madcap, sobering, nervous, mind-blowing experience. I'm planning a podcast with Nick, Richard and the two force commanders. Stay tuned.

I will definitely be looking to do one of these for my J3 group and possibly for my fellow OCS instructors in the near future. Stay tuned for that, as well.

Monday, August 31, 2020

CEH: Gathering Host And Network Information | Scanning

Scanning

It is important that the information-gathering stage be as complete as possible to identify the best location and targets to scan. After the completion of  footprinting and information gathering methodologies, scanning is performed.
During scanning, the hacker has vision to get information about network an hosts which are connected to that network that can help hackers to determine which type of exploit to use in hacking a system precisely. Information such as an IP addresses, operating system, services, and installed applications.

Scanning is the methodology used to detect the system that are alive and respond on the network or not. Ethical hackers use these type of scanning to identify the IP address of target system. Scanning is also used to determine the availability of the system whether it is connected to the network or not.

Types Of Scanning 

Network ScanningIdentifies IP addresses on a given network or subnet
Port ScanningDetermines open, close, filtered and unfiltered ports and services
Vulnerability ScannerDetect the vulnerability on the target system

Port Scanning ​

Port scanning is the process of identifying open and available TCP/IP ports on a system. Port-scanning tools enable a hacker to learn about the services available on a given system. Each service or application on a machine is associated with a well-known port number. Port Numbers are divided into three ranges:
  • Well-Known Ports: 0-1023
  • Registered Ports: 1024-49151
  • Dynamic Ports: 49152-6553

Network Scanning

Network scanning is performed for the detection of active hosts on a network either you wanna attack them or as a network administrator. Network-scanning tools attempt to identify all the live or responding hosts on the network and their corresponding IP addresses. Hosts are identified by their individual IP addresses.

Vulnerability Scanning

This methodology is used to detect vulnerabilities of computer systems on a network. A vulnerability scanner typically identifies the operating system and version number, including applications that are installed. After that the scanner will try to detect vulnerabilities and weakness in the operating system. During the later attack phase, a hacker can exploit those weaknesses in order to gain access to the system. Moreover, the vulnerability scanner can be detected as well, because the scanner must interact over the network with target machine.

The CEH Scanning Methodology

As a CEH, you should understand the methodology about scanning presented in the figure below. Because this is the actual need of hackers to perform further attacks after the information about network and hosts which are connected to the network. It detects the vulnerabilities in the system bu which hackers can be accessible to that system by exploitation of that vulnerabilities.



More articles

Sunday, August 30, 2020

15 Important Run Commands Every Windows User Should Know

There are several ways to efficiently access the files, folders, and programs in Windows operating system. We can create shortcuts, pin programs to the taskbar, Start menu shortcuts etc. but we can't do it for all programs in many cases. However, the Windows Run Command box is one of the most efficient ways of accessing system programs, folders, and settings.

In this article, I am going to share 15 most important Run commands for Windows users. These commands can make it easier to manage a lot of tasks.
How to open Windows Run command box?
You need to press Win+R (Hold Windows button then Press R)

Important Run Commands Every Windows User Should Know

1. %temp%
This is the fastest way to clear the temporary files from your computer. It can save a lot of space which was being wasted by temporary files.
2. cmd 
This command will open the windows DOS command prompt. Windows command prompt is very useful for performing many tasks which are not possible using graphical user interface.
3. MSConfig
Windows Run Command - MSconfig-compressed
Windows System Configuration
This command will open Windows System Configuration where you can edit different things like the boot options, startup options, services, etc.
4. sysdm.cpl
Windows Run Command - sysdm cpl-compressed
System Properties window
This command will open the System Properties window, Where you can change the system protection and performance related many settings
5. Powershell
Powershell is very similar the command prompt. Just type this command in the Run dialog box, and you will have your PowerShell opened without administrator privileges.
6. perfmon.msc
Windows Run Command - perfmon msc-compressed
Windows System Performance monitor
This command can be used to monitor the performance of your computer. There are plenty of options for monitoring the system performance
7. regedit
Regedit Run command is used to open the Windows Registry. It is a hierarchical database that hosts all the configurations and settings of Windows operating system, it's users and the installed software.
8. \ (Backslash)
This is one of the lesser known Run commands. Just enter the backslash into the Run dialog box and it will open up the C drive. It is one of the quickest ways to access the C drive.
9. . (Dot)
This is yet another lesser known Run command. When executed, it opens the current user's home folder which hosts all the other local folders like the Downloads, Documents, Desktop, Pictures, etc.
10. .. (Double Dots)
When you execute these two dots in the Run dialog box, it will open up the Users folder which is located directly on the C drive
11. Control
This command will open the control panel. Control panel is used for managing all the system settings and programs
12. hdwwiz.cpl
Windows Run Command - hdwwiz-
Windows Device Manager
This command is used to open the Device Manager in Windows. You can manage all the device connected internally or externally to your PC.
13. Notepad
The quickest way to open notepad in Windows. Just type this command in Run Box and hit enter.
14. osk
This command will open On-Screen Keyboard on your display monitor. You can easily touch and type or use your mouse for typing.
15. taskmgr 
This command will open task manager where you can manage all the processes and programs running on Windows Operating system.

Related word


  1. Hack Tools Download
  2. Tools For Hacker
  3. Computer Hacker
  4. Github Hacking Tools
  5. Black Hat Hacker Tools
  6. Hacking Tools For Mac
  7. Game Hacking
  8. How To Make Hacking Tools
  9. Pentest Tools For Windows
  10. Hack Tool Apk No Root
  11. How To Make Hacking Tools
  12. Hack Tools For Windows
  13. Pentest Tools Free
  14. Bluetooth Hacking Tools Kali
  15. Game Hacking
  16. Hacking Tools Hardware
  17. Pentest Tools Tcp Port Scanner
  18. Black Hat Hacker Tools
  19. Game Hacking
  20. Pentest Tools Framework
  21. Nsa Hacker Tools
  22. New Hacker Tools
  23. Hack And Tools
  24. Ethical Hacker Tools
  25. Hack Rom Tools
  26. Blackhat Hacker Tools
  27. Hacks And Tools
  28. Hacking Tools For Kali Linux
  29. Hack Tools For Mac
  30. Pentest Tools Nmap
  31. Hacking Tools Free Download
  32. Hacker Tools Github
  33. Termux Hacking Tools 2019
  34. Computer Hacker
  35. Pentest Tools Website
  36. Wifi Hacker Tools For Windows
  37. Pentest Tools
  38. Hack Tools For Mac
  39. Pentest Tools For Windows
  40. Hacking Tools Usb
  41. Hack And Tools
  42. Beginner Hacker Tools
  43. Usb Pentest Tools
  44. Ethical Hacker Tools
  45. Hacking Tools For Mac
  46. Hacker Tools Hardware
  47. Hacking Tools For Beginners
  48. Hacking Tools Online
  49. How To Install Pentest Tools In Ubuntu
  50. Pentest Tools List
  51. Hacking Tools Github
  52. Kik Hack Tools
  53. Hacker Tools Hardware
  54. Hacking Tools For Windows 7
  55. Hack Tools Github
  56. Hacking Tools 2019
  57. Tools 4 Hack
  58. Hacker Tools For Mac
  59. Hack Tools For Mac
  60. Android Hack Tools Github
  61. Hacking Tools Windows 10
  62. Hacking Tools
  63. Pentest Tools Nmap
  64. Nsa Hack Tools Download
  65. Tools 4 Hack
  66. Hack Apps
  67. Hacking Tools Windows 10
  68. Hacking Tools Hardware
  69. How To Make Hacking Tools
  70. Hacker Tools For Windows
  71. Hacking Tools Windows 10
  72. Hacking Tools Free Download
  73. Hacker Tools Mac
  74. Hack Tools For Mac
  75. Hacker Tools Linux
  76. Pentest Tools Website
  77. Hack Tools For Windows
  78. Hacker Tools For Pc
  79. Hacking Tools Mac
  80. What Is Hacking Tools
  81. Hack Tools
  82. Best Hacking Tools 2020
  83. Hacks And Tools
  84. Hacking Tools For Windows
  85. Hacker
  86. Hack Tools For Games
  87. Pentest Tools Subdomain
  88. Hack Tools Pc
  89. Pentest Automation Tools
  90. Termux Hacking Tools 2019
  91. New Hacker Tools
  92. Pentest Reporting Tools
  93. Hack Tools Github
  94. Hacker Tools 2019
  95. Game Hacking
  96. Hacking Tools And Software
  97. What Are Hacking Tools
  98. Hacker Tools Hardware
  99. Hack Tools Online
  100. Pentest Tools Framework
  101. Hack Tools
  102. Hacking Tools Pc
  103. Hacker Tools Free
  104. Blackhat Hacker Tools
  105. Hacking Tools Windows 10
  106. Hacking Tools Software
  107. Hacking Tools Hardware
  108. Hacker Tools Windows
  109. Hacking Tools Name
  110. Pentest Tools Nmap
  111. Hack Tools 2019
  112. Tools 4 Hack
  113. Wifi Hacker Tools For Windows
  114. Pentest Tools Linux
  115. Hacking Tools For Windows Free Download
  116. Install Pentest Tools Ubuntu
  117. Hacking Apps
  118. Hak5 Tools
  119. Hack Tools Github
  120. Hack Tools Mac
  121. Hacker Tools Github
  122. Hacker Tools Windows
  123. Best Hacking Tools 2020
  124. Hack And Tools
  125. Pentest Tools Port Scanner
  126. Hacking Tools Kit
  127. Hack Tools Pc
  128. Hack Tools For Ubuntu
  129. Hacking Tools Online
  130. Hack Website Online Tool
  131. Hacking Tools Mac
  132. Hacker Tools Apk Download
  133. Hacker Tools 2019
  134. Hacker Tools
  135. Pentest Tools Bluekeep
  136. Pentest Tools Framework
  137. Computer Hacker
  138. Hacker Tools Windows
  139. Hak5 Tools
  140. Hacker Tools Windows
  141. Hacker Tools Software
  142. Hacker Techniques Tools And Incident Handling
  143. Hackers Toolbox
  144. Pentest Tools For Windows
  145. New Hack Tools
  146. Pentest Tools Website
  147. Hack Tools For Pc
  148. Hackrf Tools
  149. Hacking Tools For Windows
  150. Pentest Tools Free
  151. Hacking Apps
  152. What Are Hacking Tools
  153. Hacker Tools For Ios
  154. Hacker Tools Online
  155. Pentest Tools Nmap
  156. Nsa Hacker Tools
  157. Hacking Tools Usb
  158. Pentest Tools For Ubuntu
  159. Hak5 Tools
  160. Nsa Hack Tools Download
  161. Hack Tools
  162. Usb Pentest Tools
  163. Hacker Tools Mac
  164. Free Pentest Tools For Windows
  165. Pentest Tools Subdomain
  166. Hacking Tools Windows
  167. Pentest Tools Framework
  168. Pentest Tools Android
  169. Pentest Tools Github
  170. Hacking Tools Online
  171. Beginner Hacker Tools
  172. Nsa Hack Tools Download
  173. Hacker Tools Apk
  174. Best Hacking Tools 2019
  175. Hacking Tools For Pc

Blog Archive