Upgrade to Pro — share decks privately, control downloads, hide ads and more …

ITHOME2019-手把手,教你如何處理資安事件

jack chou
March 19, 2019

 ITHOME2019-手把手,教你如何處理資安事件

jack chou

March 19, 2019
Tweet

More Decks by jack chou

Other Decks in Technology

Transcript

  1. 經歷介紹 • 證照: – CEH – CHFI • 經歷: –

    協助檢調單位偵辦重大網路犯罪案件 – 建置企業APT防護 – 協助企業資安事件處理 • 專長: – Incident Response – Penetration Testing & Exploit Research – Malware Analysis – Security Solution Implementation • APT Gateway/Mail/Sandbox/Endpoint • NGFW & NGIPS • Managed Detection and Response
  2. LOLBIN • Only pre-installed software is used by the attacker

    and no additional binary executables are installed onto the system • https://lolbas-project.github.io/ • https://gtfobins.github.io/
  3. 企業的入侵向量(Initial Access) • The initial access tactic represents the vectors

    adversaries use to gain an initial foothold within a network. • 駭客怎麼打進來的方法…
  4. 17 職業級滅證 • 某一天早上九點半,對外網站完全開不起來… • IR 項目 • History 全清除

    • /var/log/* 全清除 • /home/wwroot/* 全清除 (只殘留資料夾) • /etc/ 相關config 全清除
  5. Mac OS IR Tool • TOOL: –KnockKnock –TaskExplorer –Dylib Hijack

    Scanner –https://objective- see.com/products.html –https://github.com/jbrad ley89/osx_incident_respo nse_scripting_and_analys is
  6. 資安沒有百分之百 唯有讓駭客入侵的成本提高 The cyber adversary's tactics flow like water, seeking

    the path of least resistance. Plan accordingly. - Sun Tzu, The Art of Cyber War -
  7. 被入侵並不可恥 是否有真正回饋及改善 The competent cyber warrior learns from their mistakes.

    The cyber master learns from the mistakes & knowhow of others. - Sun Tzu, The Art of Cyber War -
  8. Q&A