Presentation is loading. Please wait.

Presentation is loading. Please wait.

Identify Your System The best way to protect you against computer attack Irvan

Similar presentations


Presentation on theme: "Identify Your System The best way to protect you against computer attack Irvan"— Presentation transcript:

1 Identify Your System The best way to protect you against computer attack Irvan http://irvan.or.id

2 Agenda Introduction Identifying anomalies on Linux Based System Identifying anomalies on Windows Based System Discuss?

3 Introduction Sometimes we don’t know whether our computer is being attacked or not. Most people doesn’t know how to recognize anomalies on their system, even though they are so familiar with their own system. Users often underestimate about security audit things. But for common they are really don’t know how to recognize it. I am a Linux user, what should I do? I am a Windows user, what should I do?

4 Identifying anomalies on Linux Based System

5 The “/var/log/messages”

6 Seeing process through “ps”

7 Watching your “httpd log”

8 Knowing error message from “httpd” activities

9 Watching out your “door” trought “netstat” command

10 Take time to see “lastlogin”

11 More detail with “lsof –i”

12 Sniff your network with “tcpdump”

13 Get process detail with “top”

14 Who is online, and what they do?

15 Is there any “uninvited” guest?

16 Identifying anomalies on Windows Based System

17 Check your connection with “netstat”

18 The “Task Manager” things

19

20

21

22 Who is online?

23 What is running on your system?

24 Find the “unusual” key on your registry

25 Find the unusual things on your “c:\windows”

26 Find the unusual things on your “c:\windows\system32”

27 Is there any “uninvited” groups?

28 Is there any “uninvited” users?

29 Discuss?

30 Thank You Happy Hacking..!!


Download ppt "Identify Your System The best way to protect you against computer attack Irvan"

Similar presentations


Ads by Google