msec attack - defend system

16
ATTACK - DEFEND Attack – Defend Computer Networks Hoàng Cường 14/03/2022 Hoàng Cường - MSEC 1

Upload: hoang-cuong

Post on 07-Aug-2015

1.917 views

Category:

Technology


1 download

TRANSCRIPT

15/04/2023 Hoàng Cường - MSEC 1

ATTACK - DEFEND

Attack – Defend Computer NetworksHoàng Cường

15/04/2023 Hoàng Cường - MSEC 2

CONTENTS

PART I: ATTACKI. Gathering Information.

II. Scanning.

III. Exploited.

IV. Privilege Escalation.

V. Expansion.

VI. Backdoor.

VII. Remove Tracks.

15/04/2023 Hoàng Cường - MSEC 3

CONTENTS

PART II: DEFENDI. Security Policy.

II. Recovery.

III. Forensic.

IV. Intrustion Detection System.

V. System automatic malware analysis.

VI. Pentesting System.

15/04/2023 Hoàng Cường - MSEC 4

PART I: ATTACK

I. Gathering Information.

II. Scanning.

III.Exploited.

IV.Privilege Escalation.

V. Expansion.

VI.Backdoor.

VII. Remove Tracks.

- Hosting, Domain.- Services.- OS,Software.- Administrator.

- Network maps.- Security policy.- People.

15/04/2023 Hoàng Cường - MSEC 5

PART I: ATTACK

I. Gathering Information.

II. Scanning.

III.Exploited.

IV.Privilege Escalation.

V. Expansion.

VI.Backdoor.

VII. Remove Tracks.- Vulnerabilities.- Operating System.- Web Application.

- Software Application.- System Application.- Hardware.

15/04/2023 Hoàng Cường - MSEC 6

PART I: ATTACK

I. Gathering Information.

II. Scanning.

III. Exploited.

IV. Privilege Escalation.

V. Expansion.

VI.Backdoor.

VII. Remove Tracks.

- Exploit DB- 1337.com- Metasploit- Nexpose (Rapid7)- Core Impact- Exploit Unknow (Private).- Malware- Phishing- Method Attack #Other

15/04/2023 Hoàng Cường - MSEC 7

PART I: ATTACK

I. Gathering Information.

II. Scanning.

III. Exploited.

IV. Privilege Escalation.

V. Expansion.

VI. Backdoor.

VII. Remove Tracks.

- Malware- Human - Harware

15/04/2023 Hoàng Cường - MSEC 8

PART I: ATTACK

I. Gathering Information.

II. Scanning.

III. Exploited.

IV. Privilege Escalation.

V. Expansion.

VI.Backdoor.

VII. Remove Tracks.

- Flood Logs- Anti-Forensic- Bypass Firewall, bypass Security policy

15/04/2023 Hoàng Cường - MSEC 9

PART II: DEFEND

I. Security Policy.

II. Recovery.

III.Forensic.

IV.Intrustion Detection System.

V. System automatic malware analysis.

VI.Pentesting System.

15/04/2023 Hoàng Cường - MSEC 10

PART II: DEFEND

I. Security Policy.

II. Recovery.

III.Forensic.

IV.Intrustion Detection System.

V. System automatic malware analysis.

VI.Pentesting System.

15/04/2023 Hoàng Cường - MSEC 11

PART II: DEFEND

I. Security Policy.

II. Recovery.

III.Forensic.

IV.Intrustion Detection System.

V. System automatic malware analysis.

VI.Pentesting System.

15/04/2023 Hoàng Cường - MSEC 12

PART II: DEFEND

I. Security Policy.

II. Recovery.

III.Forensic.

IV.Intrustion Detection System.

V. System automatic malware analysis.

VI.Pentesting System.

15/04/2023 Hoàng Cường - MSEC 13

PART II: DEFEND

I. Security Policy.

II. Recovery.

III.Forensic.

IV.Intrustion Detection System.

V. Malware analysis.

VI.Pentesting System.

15/04/2023 Hoàng Cường - MSEC 14

PART II: DEFEND

I. Security Policy.

II. Recovery.

III. Forensic.

IV. Intrustion Detection System.

V. System automatic malware analysis.

VI. Pentesting System.

15/04/2023 Hoàng Cường - MSEC 15

Q&A time