Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 13 ©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved.. Investigating Computer Intrusions.

Similar presentations


Presentation on theme: "Chapter 13 ©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved.. Investigating Computer Intrusions."— Presentation transcript:

1 Chapter 13 ©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved.. Investigating Computer Intrusions

2 Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE 13.1 Use of the nmap scanning tool to obtain information about what services are running on a remote computer.

3 Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE 13.2 Metasploit being used to exploit a vulnerability on a remote Windows computer.

4 Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE 13.3 Directory listing obtained from a remote system after gaining remote access via a vulnerability exploited using Metasploit.

5 Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE 13.4 Listing showing details about processes running on a Windows system.

6 Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE 13.5 Order of volatility.

7 Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE 13.6 Unusual process viewed using Alt-Ctrl-Del.

8 Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE 13.7 EnCase used to analyze Linux system showing rootkit installations script.


Download ppt "Chapter 13 ©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved.. Investigating Computer Intrusions."

Similar presentations


Ads by Google