ECIH - commands

 0    50 schede    dawidwilk3
Scarica mp3 Stampa Gioca Testa il tuo livello
 
Domanda Risposta
System info
inizia ad imparare
systeminfo. exe, PsInfo
volatile info
inizia ad imparare
cat; uname
command history
inizia ad imparare
doskey /history
Netstat all executable files running running processes
inizia ad imparare
netstat -ab
basic info about processes
inizia ad imparare
Pslist. exe
string search
inizia ad imparare
pmdump. exe
chcek service for any malicious programm installed
inizia ad imparare
tasklist; wmic
logged-on users
inizia ad imparare
net sessions; logonsessions
NetBIOs info
inizia ad imparare
nbstat
linux running processes
inizia ad imparare
top; w; ps; pstree
netstat TCP and UDP including ports
inizia ad imparare
netstat -ano
netstat routing table
inizia ad imparare
netstat -r
Ping sweet scan attempts
inizia ad imparare
icmp. type==8; icmp. type==0; tcp. dstport==7; udp. dstport==7
SYN SCAN ATTACK
inizia ad imparare
tcp. flags. syn==1
NULL SCAN
inizia ad imparare
tcp. flags==0x00
TCP XMAS SCAN
inizia ad imparare
tcp. flags==0x029
Browser data Mozilla
inizia ad imparare
C\users\user_name\AppData\local\Mozilla\Firefox\Profiles\XXXdefault\cache: cookies. sqllite, fomhistory. sqllite
Browser data Chrome
inizia ad imparare
C\users\user_name\AppData\local\google\chrome\user data\default\cache: Profile 1(cookies): Default(history)
Browser data Edge
inizia ad imparare
C\users\Admin\AppData\local\microsoft\windows\INetCache:\AC\MsEdge(cookies): History
MSQL server logs
inizia ad imparare
c: programfiles\MSsqlServer\MSsql12...\MSSQL\LOG\EROR LOG: log_n. trc (open with notepad)
function that allows retrival of the active portion of the transaction log file
inizia ad imparare
fn_dblog()
SENDMAIL - log
inizia ad imparare
SENDMAIL - log - /var/log/maillog - most linux. /var/adm/maillog Solaris. /var/log/mail. log Debian/Ubuntu
Microsoft Exchange Email Server Log
inizia ad imparare
Microsoft Exchange Email Server Log -. edb database files,. stm, checkpoint files, temp files
locate access times
inizia ad imparare
access locate times - dir command, ls command
Collecting volatile info: open files
inizia ad imparare
Collecting volatile info: open files - "net file", psFile utility, OpenFiles command
Collecting volatile info: clopboard
inizia ad imparare
Collecting volatile info: clopboard - Free Clopboard Viewer
Collecting volatile info: Service/Driver info
inizia ad imparare
Collecting volatile info: Service/Driver info - tasklist, wmic
Collecting volatile info: logged on users
inizia ad imparare
Collecting volatile info: logged on users - PsLoggedOn, netsessions, LogonSessions
Logged on users PsLoggedOn
inizia ad imparare
Logged on users PsLoggedOn - "-l"-only local logons, "-x"-doesnt display times
Logged on users LogonSessions
inizia ad imparare
Logged on users LogonSessions: "-c"-CSV, "-ct"-prints as tab, "-p"-processes list
Collecting volatile info: DLL and shared libraries
inizia ad imparare
Collecting volatile info: DLL and shared libraries: ListDLL(win) "-r"-relocated "-u"-unsigned DLL, "-r"-DLL version. Ldd/ls(linux)
Nbstat
inizia ad imparare
Nbstat: "-c"-NetBIOS name-to-IP mapping, "-n"-names registered locally, "-r"-names resolved by broadcast and querying, "-s"-current NetBIOS sessions and statuses
netstat listening connections
inizia ad imparare
netstat -a
netstat ethernet statistics - number of bytes, packets
inizia ad imparare
netstat -e
inizia ad imparare
Malware is the most common threat
port monitoring command and tool
inizia ad imparare
port monitoring command and tool - netstat, TCPView
registry monitoring tool
inizia ad imparare
registry monitoring tool - jv16 Power tools 2017
windows service monitoring
inizia ad imparare
windows service monitoring - windows server manager (SrvMan)
startup programs monitoring
inizia ad imparare
startup programs monitoring - Autoruns for Windows
Perform string search tool
inizia ad imparare
Perform string search tool - BinText
identyfing packing/obfuscation methotds tool
inizia ad imparare
identifying packing/obfuscation methotds tool - PEiD
intrusion analysis: covert communication tools:
inizia ad imparare
intrusion analysis: covert communication tools: SSDT View, ReKall, RougeKiller
Detect packet sniffing: MAC flooding
inizia ad imparare
Detect packet sniffing: MAC flooding - from various IP to single with same TTL (malformed packets)
Detect packet sniffing: ARP poisoning
inizia ad imparare
Detect packet sniffing: ARP poisoning - filter: arp. duplicate-address-detected, Xarp tool
Machine generating ... will be most likely running a sniffer
inizia ad imparare
Machine generating REVERSE DNS LOOKUP TRAFFIC will be most likely running a sniffer
check if host has its network card in promiscuos mode
inizia ad imparare
check if host has its network card in promiscuous mode - nmap -script = sniffer-detect [IP]
Detects potentially malicious elements within HTML:
inizia ad imparare
Detects potentially malicious elements within HTML: tags like <FK>,
  • , <BR>, <DIV> and background-image, <script>, <object>, <applet>, <enabled>
  • Apache web server logs
    inizia ad imparare
    Apache web server logs: /var/log/'apache2/access. log - useful with Local File Injection LFI detection
    command line tool to locate connected devices
    inizia ad imparare
    command line tool to locate connected devices: DevCon(windows)
    Behavioral analysis:
    inizia ad imparare
    Behavioral analysis: 1) extract behavioral patterns 2) compare to other users 3) generated clusters based on behav simmilarity 4) build profiles of each group 5) discover outliners of each group

    Devi essere accedere per pubblicare un commento.