当前位置:网站首页>Invasion investigation of HVV blue team
Invasion investigation of HVV blue team
2022-07-22 11:59:00 【Song dock】
as everyone knows , Blue team —— Worth is the defender , The red team —— Refers to the attacker . stay HVV When , The red side will do anything to get in , The blue side is to maintain the condition of defensive equipment . Next, let's talk about all aspects of the security screening of the blue side , Unlimited ideas .
In terms of operating system, we can divide it into Windows System 、Linux System , Therefore, it is necessary to determine the corresponding system for troubleshooting .
Windows Intrusion detection
Troubleshooting port
open cmd(win+r), Input netstat -ano Check all one port , It mainly depends on the opening of major assets to the public network
If there is 3389,3306,22 Such as weak password vulnerability , It needs to be confirmed and modified by the administrator in time .
Check the system account
stay Windows There are account permissions in the system , stay cmd(win+r) Input lusrmgr.msc, Check a valid account , Check whether there are hidden or cloned accounts
Here you can use some gadgets to automatically check , For example, a D Shield firewall . Then combine the logs , Administrator login time , Operation history to determine whether the user has exceptions .
Troubleshooting process management
Hold down CYRL+SHIFT+ESC Open Task Manager
View the management of responses , process , service ( Generally speaking, when there are many assets , Basically in dazzling )
stay CMD Input in tasklist-->> Viewing the process is also a way
View event information
stay (win+r) Input eventvwr.msc
Check the self start information
Some self start may have some malicious self start , stay (win+r) Input services.msc
Log analysis
Here we can roughly divide into two aspects
1. system log
(win+r)-->eventvwr.msc
You can see the log information
2.web Middleware log
Find the corresponding middleware log , Package and throw it into the response intelligence threat service and so on . If the service doesn't respond , Then we don't seem to have any reaction
Linux Intrusion detection
account number
The two files you must see
/etc/passwd
/etc/shadow
Intrusion detection
Query privileged users :awk -F: ‘$3==0{print $1}’ /etc/passwd Query the account that can be logged in remotely :awk ‘/\$1|\$6/{print $1}’ /etc/shadow The query has sudo Authorized account number :more /etc/sudoers | grep -v “^#\|^$” grep “ALL=(ALL)”
History commands
Command Mastery
history
Intrusion screening command
cat .bash_history >> history.txt
All packages are checked
Check port
Here and Windows The orders are different
netstat -antlp
Check progress monitoring
ps aux
Abnormal process found
direct kill -s 9 pid
If you find an exception, export it immediately
Check exception file
Check out the sensitive Directory ,
Check the system log
The default location for logs is :/var/log
--------------------------------------
边栏推荐
- User identity authentication of industrial Internet based on HHT transformation of mouse behavior
- Redis' cache penetration, breakdown, avalanche
- 布隆过滤器与布谷鸟过滤器(经典版)
- [STL]vector模拟实现
- Redis distributed lock
- 面向海洋观监测传感网的移动终端位置隐私保护研究
- IP第十二天笔记
- Here comes the multilingual model that everyone can use! It supports 59 languages, parameters 176billion, and is jointly sponsored by 1000 scientists
- 基于知识图谱的Wi-Fi室内定位技术研究
- LeetCode·987.二叉树的垂直遍历·桶排序·模拟
猜你喜欢
EN 1504-5 products for protection and repair of concrete structures concrete spraying - CE certification
电缆故障监测vr虚拟仿真教学软件的好处
Hcip day 5
工业厂区三维仿真可视化展示的应用
第02篇:分布式负载均衡
EN 1504-4: structural bonding of concrete structure products - CE certification
JVM参数配置说明
如何优雅的整合定时批量任务(荣耀典藏版)
盘一盘接口测试的那些痛点,你现在会解决了吗
第01篇:分布式注册中心
随机推荐
[英雄星球七月集训LeetCode解题日报] 第21日 堆
Viewport scaling method to solve the self adaptation of mobile terminal
News blog publishing system based on jsp+servlet+mysql
基于知识图谱的Wi-Fi室内定位技术研究
加密市场飙升至1万亿美元以上 不过是假象?加密熊市远未见底
Didi was fined 8.026 billion yuan. Musk made toys with Barbie dolls. Dall-e invited millions of people to join the test. Today, more new things are here
Go language concurrency and channel
[stl]vector Simulation Implementation
JVM参数配置说明
Redis' cache penetration, breakdown, avalanche
IP第十二天笔记
Medicine management system based on ssm+mysql+jquery
国际标准ISO/IEC 30144: 2020在智能变电站辅助监测中的应用研究
多線程與高並發day09
LeetCode·987. Vertical traversal, bucket sorting and Simulation of binary tree
Online education course classroom management system based on ssm+mysql+bootstrap
去中心化边缘渲染元宇宙协议Caduceus如何引爆Metaverse Summit 2022
陈春花文凭遭质疑,北大最新回应来了
图神经网络驱动的交通预测技术:探索与挑战
苹果因键盘不好使赔3.4亿,SpaceX接单韦布后继者,META起诉Meta,今日更多新鲜事在此