Frage |
Antworten |
Lernen beginnen
|
|
|
|
|
Lernen beginnen
|
|
|
|
|
Lernen beginnen
|
|
|
|
|
Netstat all executable files running running processes Lernen beginnen
|
|
|
|
|
basic info about processes Lernen beginnen
|
|
|
|
|
Lernen beginnen
|
|
|
|
|
chcek service for any malicious programm installed Lernen beginnen
|
|
|
|
|
Lernen beginnen
|
|
net sessions; logonsessions
|
|
|
Lernen beginnen
|
|
|
|
|
Lernen beginnen
|
|
|
|
|
netstat TCP and UDP including ports Lernen beginnen
|
|
|
|
|
Lernen beginnen
|
|
|
|
|
Lernen beginnen
|
|
icmp. type==8; icmp. type==0; tcp. dstport==7; udp. dstport==7
|
|
|
Lernen beginnen
|
|
|
|
|
Lernen beginnen
|
|
|
|
|
Lernen beginnen
|
|
|
|
|
Lernen beginnen
|
|
C\users\user_name\AppData\local\Mozilla\Firefox\Profiles\XXXdefault\cache: cookies. sqllite, fomhistory. sqllite
|
|
|
Lernen beginnen
|
|
C\users\user_name\AppData\local\google\chrome\user data\default\cache: Profile 1(cookies): Default(history)
|
|
|
Lernen beginnen
|
|
C\users\Admin\AppData\local\microsoft\windows\INetCache:\AC\MsEdge(cookies): History
|
|
|
Lernen beginnen
|
|
c: programfiles\MSsqlServer\MSsql12...\MSSQL\LOG\EROR LOG: log_n. trc (open with notepad)
|
|
|
function that allows retrival of the active portion of the transaction log file Lernen beginnen
|
|
|
|
|
Lernen beginnen
|
|
SENDMAIL - log - /var/log/maillog - most linux. /var/adm/maillog Solaris. /var/log/mail. log Debian/Ubuntu
|
|
|
Microsoft Exchange Email Server Log Lernen beginnen
|
|
Microsoft Exchange Email Server Log -. edb database files,. stm, checkpoint files, temp files
|
|
|
Lernen beginnen
|
|
access locate times - dir command, ls command
|
|
|
Collecting volatile info: open files Lernen beginnen
|
|
Collecting volatile info: open files - "net file", psFile utility, OpenFiles command
|
|
|
Collecting volatile info: clopboard Lernen beginnen
|
|
Collecting volatile info: clopboard - Free Clopboard Viewer
|
|
|
Collecting volatile info: Service/Driver info Lernen beginnen
|
|
Collecting volatile info: Service/Driver info - tasklist, wmic
|
|
|
Collecting volatile info: logged on users Lernen beginnen
|
|
Collecting volatile info: logged on users - PsLoggedOn, netsessions, LogonSessions
|
|
|
Logged on users PsLoggedOn Lernen beginnen
|
|
Logged on users PsLoggedOn - "-l"-only local logons, "-x"-doesnt display times
|
|
|
Logged on users LogonSessions Lernen beginnen
|
|
Logged on users LogonSessions: "-c"-CSV, "-ct"-prints as tab, "-p"-processes list
|
|
|
Collecting volatile info: DLL and shared libraries Lernen beginnen
|
|
Collecting volatile info: DLL and shared libraries: ListDLL(win) "-r"-relocated "-u"-unsigned DLL, "-r"-DLL version. Ldd/ls(linux)
|
|
|
Lernen beginnen
|
|
Nbstat: "-c"-NetBIOS name-to-IP mapping, "-n"-names registered locally, "-r"-names resolved by broadcast and querying, "-s"-current NetBIOS sessions and statuses
|
|
|
netstat listening connections Lernen beginnen
|
|
|
|
|
netstat ethernet statistics - number of bytes, packets Lernen beginnen
|
|
|
|
|
Lernen beginnen
|
|
Malware is the most common threat
|
|
|
port monitoring command and tool Lernen beginnen
|
|
port monitoring command and tool - netstat, TCPView
|
|
|
Lernen beginnen
|
|
registry monitoring tool - jv16 Power tools 2017
|
|
|
windows service monitoring Lernen beginnen
|
|
windows service monitoring - windows server manager (SrvMan)
|
|
|
startup programs monitoring Lernen beginnen
|
|
startup programs monitoring - Autoruns for Windows
|
|
|
Perform string search tool Lernen beginnen
|
|
Perform string search tool - BinText
|
|
|
identyfing packing/obfuscation methotds tool Lernen beginnen
|
|
identifying packing/obfuscation methotds tool - PEiD
|
|
|
intrusion analysis: covert communication tools: Lernen beginnen
|
|
intrusion analysis: covert communication tools: SSDT View, ReKall, RougeKiller
|
|
|
Detect packet sniffing: MAC flooding Lernen beginnen
|
|
Detect packet sniffing: MAC flooding - from various IP to single with same TTL (malformed packets)
|
|
|
Detect packet sniffing: ARP poisoning Lernen beginnen
|
|
Detect packet sniffing: ARP poisoning - filter: arp. duplicate-address-detected, Xarp tool
|
|
|
Machine generating ... will be most likely running a sniffer Lernen beginnen
|
|
Machine generating REVERSE DNS LOOKUP TRAFFIC will be most likely running a sniffer
|
|
|
check if host has its network card in promiscuos mode Lernen beginnen
|
|
check if host has its network card in promiscuous mode - nmap -script = sniffer-detect [IP]
|
|
|
Detects potentially malicious elements within HTML: Lernen beginnen
|
|
Detects potentially malicious elements within HTML: tags like <FK>, , <BR>, <DIV> and background-image, <script>, <object>, <applet>, <enabled>
|
|
|
Lernen beginnen
|
|
Apache web server logs: /var/log/'apache2/access. log - useful with Local File Injection LFI detection
|
|
|
command line tool to locate connected devices Lernen beginnen
|
|
command line tool to locate connected devices: DevCon(windows)
|
|
|
Lernen beginnen
|
|
Behavioral analysis: 1) extract behavioral patterns 2) compare to other users 3) generated clusters based on behav simmilarity 4) build profiles of each group 5) discover outliners of each group
|
|
|