330 likes | 426 Vues
Dive into the world of cyber warfare to understand the tactics used by cyber warriors for intrusion. Explore encrypted hard disks, re-imaged boxes, USB response difficulties, and the rise in intrusion numbers. Discover the significance of IP end point analysis, log analysis, geolocation, and proxies. Delve into methods like spear phishing, exploiting vulnerabilities in applications and operating systems, weak passwords, and insider threats. Gain insights on protecting your network through firewall and UAC settings against malware upload tricks and malicious activities. Learn how network forensics helps uncover the who, what, how, when of attacks. Take proactive measures to prevent future breaches. Thank you for reading!
E N D
Why Network Forensics? • Encrypted Hard Disks • Re-imaged Boxes • USB Response Difficulty • Increase in Number of Intrusions • IP End Point Analysis • Log Analysis • Geolocation • Proxies
How do they get in? • Spear Phish • Links (Twitter) • Vulnerabilities • Applications • OS • Weak Passwords
And Let’s Not Forget • The Insider Threat
Can’t We be Quieter ? • Use tcpdump with no IP • Listen Passively
Zenmapcan be Indecisive • Accurate as the weather… • And noisy, so you will be noticed in Logs
Exploiting the Victim • Firewall and UAC Enabled…
Important Facts when you Hacks • Who are You? • How are you in? • Got PID? • Why no GUI?
Step Right Up – Get Your Malware • How do you get malware on the victim? • Meterpreter upload • FTP Answer File • Write a BAT FILE • Use DEBUG to Compile • TFTP (not likely) • wget or curl (if Linux)
You got caught doing bad things • At least rename your stuff
Summary • Hackers get in • Network Forensics may explain: • Who • How • What • When • At a minimum, endpoint analysis • Actions can help mitigate future attacks
Thank You! Questions and Comments