当前位置:网站首页>Resumption of attack and defense drill
Resumption of attack and defense drill
2022-07-01 23:44:00 【weixin_ forty-eight million one hundred and seventy thousand fo】
Recently, I participated in a two-week offensive and defensive drill , It is also the first time to participate in offensive and defensive activities , It feels quite different from usual .
When I first arrived at the scene, I said that I mainly did the work of the blue team , But Party A's assets are not clear , So I asked Party A for a balance sheet at the first time , And understand the distribution of assets in the network area , But how many assets are there , Maybe Party A can't figure it out .
replay :
1, Understand the release of assets and network topology
I feel this is a very important point , It can be determined that the attacker hit that position , If assets are uncertain , I don't even know about the stolen house .
2, When analyzing threat logs, read more with cookie,session,token,refer Information about
Generally, when the attack team can't score , I will get my account and password by fishing , So as to enter the backstage , At this time, our threat detection system may not find . however , Generally, the attack team will find the upload point after entering the backstage , See if you can upload it webshell, Or launch other attacks , At this time, there is a record . By combining the request header cookie,session,token,refer Information to determine whether the attacker has entered the background and the specific time point , In order to trace the application log .
In addition to the basis ip Inquire about , It can also be based on UA Inquire about , Or look for the tool logo
3, Don't panic when there is a vulnerability alarm
Generally, when a vulnerability alarm occurs, it is not necessarily an attack , It may also be the normal request of business personnel . such as , Developers' development behavior is not standardized , Request that the headband be partially sql sentence , This may be reported sql Inject successful vulnerability . Whether it is an attack depends on the context of the log , such as : When there is a directory list vulnerability , We can query attacks IP Logging of , If there are a lot of sensitive file requests after the directory list , Then it may be data removal , At this time, we need to start the troubleshooting and disposal process .
4, The traceability process pays more attention to command execution , Attack messages such as code execution
Generally, such messages will have rebound IP Address or domain name . About IP You can go to fofa Search such websites , Some will have to IP The corresponding domain name . Domain name can check the record information ,whois Check whether there is personal information . At the same time, this information can also be thrown into the threat intelligence collection website , See if there is any other information . Email counter check ,GitHub Inquire about ,ip Longitude and latitude positioning , Website forgot password function , Register function, locate account number, etc , All these things can be used .
边栏推荐
- How to solve the image pop-up problem when pycharm calls Matplotlib to draw
- Algolia's search needs are almost closed
- 学成在线案例实战
- from pip._internal.cli.main import main ModuleNotFoundError: No module named ‘pip‘
- The best smart home open source system in 2022: introduction to Alexa, home assistant and homekit ecosystem
- 物联网应用技术专业是属于什么类
- excel如何打开100万行以上的csv文件
- Li Kou today's question -241 Design priorities for operational expressions
- Behind sharing e-commerce: the spirit of CO creation, symbiosis, sharing, CO prosperity and win-win
- SWT / anr problem - SWT causes kernel fuse deadlock
猜你喜欢

学成在线案例实战

How to solve the image pop-up problem when pycharm calls Matplotlib to draw

PyCharm调用matplotlib绘图时图像弹出问题怎么解决

2022年最佳智能家居开源系统:Alexa、Home Assistant、HomeKit生态系统介绍

Notes on problems - /usr/bin/perl is needed by mysql-server-5.1.73-1 glibc23.x86_ sixty-four

第六章 数据流建模

华为HMS Core携手超图为三维GIS注入新动能

有没有一段代码,让你为人类的智慧所折服

Huawei HMS core joins hands with hypergraph to inject new momentum into 3D GIS

Is there a piece of code that makes you convinced by human wisdom
随机推荐
Chapter 6 data flow modeling
Material Design组件 - 使用BottomSheet展现扩展内容(一)
How to display real-time 2D map after rviz is opened
Overview of edge calculation
ShanDong Multi-University Training #3
const // It is a const object...class nullptr_t
The essence of software architecture
Why does blocprovider feel similar to provider?
vs2015 AdminDeployment.xml
使用VB.net将PNG图片转成icon类型图标文件
E-commerce RPA robot helps brand e-commerce to achieve high traffic
Redis AOF log
from pip._internal.cli.main import main ModuleNotFoundError: No module named ‘pip‘
物联网应用技术专业是属于什么类
SWT / anr problem - SWT causes kernel fuse deadlock
Use pair to do unordered_ Key value of map
力扣今日题-241. 为运算表达式设计优先级
[leetcode] length of the last word [58]
学成在线案例实战
Postgresql源码(57)HOT更新为什么性能差距那么大?