ECIH - commands

 0    50 Datenblatt    dawidwilk3
mp3 downloaden Drucken spielen überprüfen
 
Frage Antworten
System info
Lernen beginnen
systeminfo. exe, PsInfo
volatile info
Lernen beginnen
cat; uname
command history
Lernen beginnen
doskey /history
Netstat all executable files running running processes
Lernen beginnen
netstat -ab
basic info about processes
Lernen beginnen
Pslist. exe
string search
Lernen beginnen
pmdump. exe
chcek service for any malicious programm installed
Lernen beginnen
tasklist; wmic
logged-on users
Lernen beginnen
net sessions; logonsessions
NetBIOs info
Lernen beginnen
nbstat
linux running processes
Lernen beginnen
top; w; ps; pstree
netstat TCP and UDP including ports
Lernen beginnen
netstat -ano
netstat routing table
Lernen beginnen
netstat -r
Ping sweet scan attempts
Lernen beginnen
icmp. type==8; icmp. type==0; tcp. dstport==7; udp. dstport==7
SYN SCAN ATTACK
Lernen beginnen
tcp. flags. syn==1
NULL SCAN
Lernen beginnen
tcp. flags==0x00
TCP XMAS SCAN
Lernen beginnen
tcp. flags==0x029
Browser data Mozilla
Lernen beginnen
C\users\user_name\AppData\local\Mozilla\Firefox\Profiles\XXXdefault\cache: cookies. sqllite, fomhistory. sqllite
Browser data Chrome
Lernen beginnen
C\users\user_name\AppData\local\google\chrome\user data\default\cache: Profile 1(cookies): Default(history)
Browser data Edge
Lernen beginnen
C\users\Admin\AppData\local\microsoft\windows\INetCache:\AC\MsEdge(cookies): History
MSQL server logs
Lernen beginnen
c: programfiles\MSsqlServer\MSsql12...\MSSQL\LOG\EROR LOG: log_n. trc (open with notepad)
function that allows retrival of the active portion of the transaction log file
Lernen beginnen
fn_dblog()
SENDMAIL - log
Lernen beginnen
SENDMAIL - log - /var/log/maillog - most linux. /var/adm/maillog Solaris. /var/log/mail. log Debian/Ubuntu
Microsoft Exchange Email Server Log
Lernen beginnen
Microsoft Exchange Email Server Log -. edb database files,. stm, checkpoint files, temp files
locate access times
Lernen beginnen
access locate times - dir command, ls command
Collecting volatile info: open files
Lernen beginnen
Collecting volatile info: open files - "net file", psFile utility, OpenFiles command
Collecting volatile info: clopboard
Lernen beginnen
Collecting volatile info: clopboard - Free Clopboard Viewer
Collecting volatile info: Service/Driver info
Lernen beginnen
Collecting volatile info: Service/Driver info - tasklist, wmic
Collecting volatile info: logged on users
Lernen beginnen
Collecting volatile info: logged on users - PsLoggedOn, netsessions, LogonSessions
Logged on users PsLoggedOn
Lernen beginnen
Logged on users PsLoggedOn - "-l"-only local logons, "-x"-doesnt display times
Logged on users LogonSessions
Lernen beginnen
Logged on users LogonSessions: "-c"-CSV, "-ct"-prints as tab, "-p"-processes list
Collecting volatile info: DLL and shared libraries
Lernen beginnen
Collecting volatile info: DLL and shared libraries: ListDLL(win) "-r"-relocated "-u"-unsigned DLL, "-r"-DLL version. Ldd/ls(linux)
Nbstat
Lernen beginnen
Nbstat: "-c"-NetBIOS name-to-IP mapping, "-n"-names registered locally, "-r"-names resolved by broadcast and querying, "-s"-current NetBIOS sessions and statuses
netstat listening connections
Lernen beginnen
netstat -a
netstat ethernet statistics - number of bytes, packets
Lernen beginnen
netstat -e
Lernen beginnen
Malware is the most common threat
port monitoring command and tool
Lernen beginnen
port monitoring command and tool - netstat, TCPView
registry monitoring tool
Lernen beginnen
registry monitoring tool - jv16 Power tools 2017
windows service monitoring
Lernen beginnen
windows service monitoring - windows server manager (SrvMan)
startup programs monitoring
Lernen beginnen
startup programs monitoring - Autoruns for Windows
Perform string search tool
Lernen beginnen
Perform string search tool - BinText
identyfing packing/obfuscation methotds tool
Lernen beginnen
identifying packing/obfuscation methotds tool - PEiD
intrusion analysis: covert communication tools:
Lernen beginnen
intrusion analysis: covert communication tools: SSDT View, ReKall, RougeKiller
Detect packet sniffing: MAC flooding
Lernen beginnen
Detect packet sniffing: MAC flooding - from various IP to single with same TTL (malformed packets)
Detect packet sniffing: ARP poisoning
Lernen beginnen
Detect packet sniffing: ARP poisoning - filter: arp. duplicate-address-detected, Xarp tool
Machine generating ... will be most likely running a sniffer
Lernen beginnen
Machine generating REVERSE DNS LOOKUP TRAFFIC will be most likely running a sniffer
check if host has its network card in promiscuos mode
Lernen beginnen
check if host has its network card in promiscuous mode - nmap -script = sniffer-detect [IP]
Detects potentially malicious elements within HTML:
Lernen beginnen
Detects potentially malicious elements within HTML: tags like <FK>,
  • , <BR>, <DIV> and background-image, <script>, <object>, <applet>, <enabled>
  • Apache web server logs
    Lernen beginnen
    Apache web server logs: /var/log/'apache2/access. log - useful with Local File Injection LFI detection
    command line tool to locate connected devices
    Lernen beginnen
    command line tool to locate connected devices: DevCon(windows)
    Behavioral analysis:
    Lernen beginnen
    Behavioral analysis: 1) extract behavioral patterns 2) compare to other users 3) generated clusters based on behav simmilarity 4) build profiles of each group 5) discover outliners of each group

    Sie müssen eingeloggt sein, um einen Kommentar zu schreiben.