Download presentation
Presentation is loading. Please wait.
Published byBerniece Richardson Modified over 9 years ago
1
Identify Your System The best way to protect you against computer attack Irvan http://irvan.or.id
2
Agenda Introduction Identifying anomalies on Linux Based System Identifying anomalies on Windows Based System Discuss?
3
Introduction Sometimes we don’t know whether our computer is being attacked or not. Most people doesn’t know how to recognize anomalies on their system, even though they are so familiar with their own system. Users often underestimate about security audit things. But for common they are really don’t know how to recognize it. I am a Linux user, what should I do? I am a Windows user, what should I do?
4
Identifying anomalies on Linux Based System
5
The “/var/log/messages”
6
Seeing process through “ps”
7
Watching your “httpd log”
8
Knowing error message from “httpd” activities
9
Watching out your “door” trought “netstat” command
10
Take time to see “lastlogin”
11
More detail with “lsof –i”
12
Sniff your network with “tcpdump”
13
Get process detail with “top”
14
Who is online, and what they do?
15
Is there any “uninvited” guest?
16
Identifying anomalies on Windows Based System
17
Check your connection with “netstat”
18
The “Task Manager” things
22
Who is online?
23
What is running on your system?
24
Find the “unusual” key on your registry
25
Find the unusual things on your “c:\windows”
26
Find the unusual things on your “c:\windows\system32”
27
Is there any “uninvited” groups?
28
Is there any “uninvited” users?
29
Discuss?
30
Thank You Happy Hacking..!!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.