当前位置:网站首页>Resumption of attack and defense drill
Resumption of attack and defense drill
2022-07-01 23:44:00 【weixin_ forty-eight million one hundred and seventy thousand fo】
Recently, I participated in a two-week offensive and defensive drill , It is also the first time to participate in offensive and defensive activities , It feels quite different from usual .
When I first arrived at the scene, I said that I mainly did the work of the blue team , But Party A's assets are not clear , So I asked Party A for a balance sheet at the first time , And understand the distribution of assets in the network area , But how many assets are there , Maybe Party A can't figure it out .
replay :
1, Understand the release of assets and network topology
I feel this is a very important point , It can be determined that the attacker hit that position , If assets are uncertain , I don't even know about the stolen house .
2, When analyzing threat logs, read more with cookie,session,token,refer Information about
Generally, when the attack team can't score , I will get my account and password by fishing , So as to enter the backstage , At this time, our threat detection system may not find . however , Generally, the attack team will find the upload point after entering the backstage , See if you can upload it webshell, Or launch other attacks , At this time, there is a record . By combining the request header cookie,session,token,refer Information to determine whether the attacker has entered the background and the specific time point , In order to trace the application log .
In addition to the basis ip Inquire about , It can also be based on UA Inquire about , Or look for the tool logo
3, Don't panic when there is a vulnerability alarm
Generally, when a vulnerability alarm occurs, it is not necessarily an attack , It may also be the normal request of business personnel . such as , Developers' development behavior is not standardized , Request that the headband be partially sql sentence , This may be reported sql Inject successful vulnerability . Whether it is an attack depends on the context of the log , such as : When there is a directory list vulnerability , We can query attacks IP Logging of , If there are a lot of sensitive file requests after the directory list , Then it may be data removal , At this time, we need to start the troubleshooting and disposal process .
4, The traceability process pays more attention to command execution , Attack messages such as code execution
Generally, such messages will have rebound IP Address or domain name . About IP You can go to fofa Search such websites , Some will have to IP The corresponding domain name . Domain name can check the record information ,whois Check whether there is personal information . At the same time, this information can also be thrown into the threat intelligence collection website , See if there is any other information . Email counter check ,GitHub Inquire about ,ip Longitude and latitude positioning , Website forgot password function , Register function, locate account number, etc , All these things can be used .
边栏推荐
- 安全协议重点
- Li Kou today's question -241 Design priorities for operational expressions
- 深度学习 | 三个概念:Epoch, Batch, Iteration
- - Oui. Env. Fichier XXX, avec constante, mais non spécifié
- 力扣今日题-241. 为运算表达式设计优先级
- Overview of edge calculation
- 为什么PHP叫超文本预处理器
- Postgresql源码(57)HOT更新为什么性能差距那么大?
- ADO. Net SqlConnection object usage summary
- from pip._internal.cli.main import main ModuleNotFoundError: No module named ‘pip‘
猜你喜欢
Use vb Net to convert PNG pictures into icon type icon files
问题随记 —— file /usr/share/mysql/charsets/README from install of MySQL-server-5.1.73-1.glibc23.x86_64 c
Concepts of dictionary, hash table and array
ARP报文头部格式和请求流程
电商RPA机器人,助力品牌电商抢立流量高点
Notblank and notempty
Current situation and future development trend of Internet of things
Huawei HMS core joins hands with hypergraph to inject new momentum into 3D GIS
Experience of practical learning of Silicon Valley products
TS初次使用、ts类型
随机推荐
物联网技术应用属于什么专业分类
小程序表单校验封装
SWT / anr problem - SWT causes kernel fuse deadlock
. env. XXX file, with constant, but undefined
Linux foundation - centos7 offline installation of MySQL
The third part of the construction of the defense system of offensive and defensive exercises is the establishment of a practical security system
[understanding of opportunity-35]: Guiguzi - flying clamp - the art of remote connection, remote control and remote testing
Why is PHP called hypertext preprocessor
2021 robocom world robot developer competition - preliminary competition of higher vocational group
Kubernetes resource object introduction and common commands (III)
MT manager test skiing Adventure
Postgresql随手记(10)动态执行EXECUTING语法解析过程
2021 robocom world robot developer competition - preliminary competition of undergraduate group
深度学习 | 三个概念:Epoch, Batch, Iteration
Matplotlib common settings
Redis master-slave synchronization
【无标题】
2022年最佳智能家居开源系统:Alexa、Home Assistant、HomeKit生态系统介绍
Zero foundation tutorial of Internet of things development
from pip._internal.cli.main import main ModuleNotFoundError: No module named ‘pip‘