当前位置:网站首页>Analysis ideas after discovering that the on duty equipment is attacked
Analysis ideas after discovering that the on duty equipment is attacked
2022-07-08 01:56:00 【tlucky1】
① Discover the attack action and block the attack
② By analyzing the data package , Confirm the authenticity of the attack action , Excluded as load and agent devices , Avoid affecting the business .
③ By analyzing the data packets, we can judge whether the data initiator has attack behavior or business , Simulate trigger scenario , And confirm whether the vulnerability exists and give targeted suggestions .
④ If it is determined to be an attack :
Locate the payload, Analyze what the attack action is , Read the file 、 Printouts 、
Write files and try to download files 、 Execute functions or commands , Then analyze the alarm response body 、 Whether the network behavior is moving
Make the desired result , If it meets the expectation, the attack will succeed , Give targeted disposal and vulnerability repair suggestions. If it is a business
Trigger , It is necessary to analyze vulnerability points, provide utilization details and give targeted repair suggestions .
边栏推荐
- 滑环在直驱电机转子的应用领域
- Node JS maintains a long connection
- [SolidWorks] modify the drawing format
- Redux使用
- Chapter 7 behavior level modeling
- Wechat applet uniapp page cannot jump: "navigateto:fail can not navigateto a tabbar page“
- 2022国内十大工业级三维视觉引导企业一览
- 快手小程序担保支付php源码封装
- The method of using thread in PowerBuilder
- Qml 字体使用pixelSize来自适应界面
猜你喜欢

In depth analysis of ArrayList source code, from the most basic capacity expansion principle, to the magic iterator and fast fail mechanism, you have everything you want!!!

Apache多个组件漏洞公开(CVE-2022-32533/CVE-2022-33980/CVE-2021-37839)

Why does the updated DNS record not take effect?

C language -cmake cmakelists Txt tutorial

滑环在直驱电机转子的应用领域

List of top ten domestic industrial 3D visual guidance enterprises in 2022

Voice of users | winter goes and spring comes, waiting for flowers to bloom -- on gbase 8A learning comprehension

2022国内十大工业级三维视觉引导企业一览
软件测试笔试题你会吗?

保姆级教程:Azkaban执行jar包(带测试样例及结果)
随机推荐
图解网络:揭开TCP四次挥手背后的原理,结合男女朋友分手的例子,通俗易懂
Matlab r2021b installing libsvm
Voice of users | understanding of gbase 8A database learning
很多小伙伴不太了解ORM框架的底层原理,这不,冰河带你10分钟手撸一个极简版ORM框架(赶快收藏吧)
静态路由配置全面详解,静态路由快速入门指南
Uniapp one click Copy function effect demo (finishing)
Gbase observation | how to protect the security of information system with frequent data leakage
用户之声 | 对于GBase 8a数据库学习的感悟
Exit of processes and threads
burpsuite
给刚入门或者准备转行网络工程师的朋友一些建议
Version 2.0 of tapdata, the open source live data platform, has been released
powerbuilder 中使用线程的方法
液压旋转接头的使用事项
PB9.0 insert OLE control error repair tool
Node JS maintains a long connection
Introduction à l'outil nmap et aux commandes communes
In depth analysis of ArrayList source code, from the most basic capacity expansion principle, to the magic iterator and fast fail mechanism, you have everything you want!!!
Apache multiple component vulnerability disclosure (cve-2022-32533/cve-2022-33980/cve-2021-37839)
Urban land use distribution data / urban functional zoning distribution data / urban POI points of interest / vegetation type distribution