msec attack - defend system
Post on 07-Aug-2015
1.916 Views
Preview:
TRANSCRIPT
15/04/2023 Hoàng Cường - MSEC 2
CONTENTS
PART I: ATTACKI. Gathering Information.
II. Scanning.
III. Exploited.
IV. Privilege Escalation.
V. Expansion.
VI. Backdoor.
VII. Remove Tracks.
15/04/2023 Hoàng Cường - MSEC 3
CONTENTS
PART II: DEFENDI. Security Policy.
II. Recovery.
III. Forensic.
IV. Intrustion Detection System.
V. System automatic malware analysis.
VI. Pentesting System.
15/04/2023 Hoàng Cường - MSEC 4
PART I: ATTACK
I. Gathering Information.
II. Scanning.
III.Exploited.
IV.Privilege Escalation.
V. Expansion.
VI.Backdoor.
VII. Remove Tracks.
- Hosting, Domain.- Services.- OS,Software.- Administrator.
- Network maps.- Security policy.- People.
15/04/2023 Hoàng Cường - MSEC 5
PART I: ATTACK
I. Gathering Information.
II. Scanning.
III.Exploited.
IV.Privilege Escalation.
V. Expansion.
VI.Backdoor.
VII. Remove Tracks.- Vulnerabilities.- Operating System.- Web Application.
- Software Application.- System Application.- Hardware.
15/04/2023 Hoàng Cường - MSEC 6
PART I: ATTACK
I. Gathering Information.
II. Scanning.
III. Exploited.
IV. Privilege Escalation.
V. Expansion.
VI.Backdoor.
VII. Remove Tracks.
- Exploit DB- 1337.com- Metasploit- Nexpose (Rapid7)- Core Impact- Exploit Unknow (Private).- Malware- Phishing- Method Attack #Other
15/04/2023 Hoàng Cường - MSEC 7
PART I: ATTACK
I. Gathering Information.
II. Scanning.
III. Exploited.
IV. Privilege Escalation.
V. Expansion.
VI. Backdoor.
VII. Remove Tracks.
- Malware- Human - Harware
15/04/2023 Hoàng Cường - MSEC 8
PART I: ATTACK
I. Gathering Information.
II. Scanning.
III. Exploited.
IV. Privilege Escalation.
V. Expansion.
VI.Backdoor.
VII. Remove Tracks.
- Flood Logs- Anti-Forensic- Bypass Firewall, bypass Security policy
15/04/2023 Hoàng Cường - MSEC 9
PART II: DEFEND
I. Security Policy.
II. Recovery.
III.Forensic.
IV.Intrustion Detection System.
V. System automatic malware analysis.
VI.Pentesting System.
15/04/2023 Hoàng Cường - MSEC 10
PART II: DEFEND
I. Security Policy.
II. Recovery.
III.Forensic.
IV.Intrustion Detection System.
V. System automatic malware analysis.
VI.Pentesting System.
15/04/2023 Hoàng Cường - MSEC 11
PART II: DEFEND
I. Security Policy.
II. Recovery.
III.Forensic.
IV.Intrustion Detection System.
V. System automatic malware analysis.
VI.Pentesting System.
15/04/2023 Hoàng Cường - MSEC 12
PART II: DEFEND
I. Security Policy.
II. Recovery.
III.Forensic.
IV.Intrustion Detection System.
V. System automatic malware analysis.
VI.Pentesting System.
15/04/2023 Hoàng Cường - MSEC 13
PART II: DEFEND
I. Security Policy.
II. Recovery.
III.Forensic.
IV.Intrustion Detection System.
V. Malware analysis.
VI.Pentesting System.
15/04/2023 Hoàng Cường - MSEC 14
PART II: DEFEND
I. Security Policy.
II. Recovery.
III. Forensic.
IV. Intrustion Detection System.
V. System automatic malware analysis.
VI. Pentesting System.
15/04/2023 Hoàng Cường - MSEC 16
ATTACK- DEFEND
MSEC
Author: Hoang Cuong
Email: hoangcuongflp@gmail.com
top related