SlideShare uma empresa Scribd logo
1 de 18
Baixar para ler offline
Securing Your Network
TECH Class 4290/4390
          Presented by:
   Vince Ada & Jason Reverri
Sans Internet Storm Center
http://isc.sans.org

Sans Reading Room
http://www.sans.org/reading_room/            Microsoft Malware Protection Center
                                             http://blogs.technet.com/b/mmpc/
Darknet
http://www.darknet.org.uk/                   Packetlife
                                             http://packetlife.net/blog/
SecLists.org Security Mailing List Archive
http://www.seclists.org                      PaulDotCom
                                             http://www.pauldotcom.com/
Schneier on Security
http://www.schneier.com/                     Paul de Souza
                                             http://paulcsfi.wordpress.com/
2600 updates
http://www.2600.com/rss.xml                  SecurityTube
                                             http://www.securitytube.net
CommandLine Kung FU
http://blog.commandlinekungfu.com            Offensive Security
                                             http://www.offensive-security.com
Google Online Security Blog
http://googleonlinesecurity.blogspot.com     Metasploit Unleashed
                                             http://www.offensive-security.com/metasploit-
Irongeek                                     unleashed/Metasploit_Unleashed_Information_Security_Training
http://www.irongeek.com
                                             Metasploit 101
Jeremiah Grossman (Whitehat Security)        http://www.securitytube.net/video/786
http://jeremiahgrossman.blogspot.com
                                             BackTrack Linux
Brian Krebs                                  http://www.backtrack-linux.org/
http://krebsonsecurity.com
                                             Great video presentation by Dave Marcus on social networks social
SC Magazine                                  engineering:
http://www.scmagazineus.com                  http://www.irongeek.com/i.php?page=videos/dojocon-2010-
                                             videos#Using%20Social%20Networks%20To%20Profile,%20Find
McAfee Labs                                  %20and%200wn%20Your%20Victims
http://blogs.mcafee.com/mcafee-labs
Photo Credits

Slide 2 http://www.flickr.com/photos/walkinline/
Slide 3 http://www.flickr.com/photos/billyboysfotocolection/
Slide 5 http://www.flickr.com/photos/christianpayne/
Slide 8 http://www.flickr.com/photos/sprengben/
Slide 10 http://www.flickr.com/photos/giantginkgo/
Slide 11 http://www.flickr.com/photos/ignacio_conejo/
Slide 12 http://www.flickr.com/photos/home_of_chaos/
Slide 13 http://www.flickr.com/photos/sklathill
Slide 14 http://www.flickr.com/photos/donsolo/
Slide 15 http://www.flickr.com/photos/mr_beaver/
Slide 16 http://www.flickr.com/photos/schmiegl/
Slide 17 http://www.flickr.com/photos/60295308@N00

Photos used under Creative Commons license

Mais conteúdo relacionado

Mais procurados

WordPress Security 2014 - The Basics of Security
WordPress Security 2014 - The Basics of SecurityWordPress Security 2014 - The Basics of Security
WordPress Security 2014 - The Basics of Security
Tony Perez
 
Instalar un grupo_y_excluir_otro
Instalar un grupo_y_excluir_otroInstalar un grupo_y_excluir_otro
Instalar un grupo_y_excluir_otro
James Jara
 
Httpd sys content_t_apache_linux
Httpd sys content_t_apache_linuxHttpd sys content_t_apache_linux
Httpd sys content_t_apache_linux
James Jara
 
Instalar cliente bittorrent
Instalar cliente bittorrentInstalar cliente bittorrent
Instalar cliente bittorrent
James Jara
 
WordPress Security - Learning From Hacks
WordPress Security - Learning From HacksWordPress Security - Learning From Hacks
WordPress Security - Learning From Hacks
Tony Perez
 
Installar un paquete_rpm_linux
Installar un paquete_rpm_linuxInstallar un paquete_rpm_linux
Installar un paquete_rpm_linux
James Jara
 

Mais procurados (20)

Corncon 2021 - Inside the Unlikely Romance
Corncon 2021 - Inside the Unlikely RomanceCorncon 2021 - Inside the Unlikely Romance
Corncon 2021 - Inside the Unlikely Romance
 
TechCrunch Early Stage 2020 - How to prioritize security at your startup
TechCrunch Early Stage 2020 - How to prioritize security at your startupTechCrunch Early Stage 2020 - How to prioritize security at your startup
TechCrunch Early Stage 2020 - How to prioritize security at your startup
 
Photosynth Introduction
Photosynth IntroductionPhotosynth Introduction
Photosynth Introduction
 
WordPress Security 2014 - The Basics of Security
WordPress Security 2014 - The Basics of SecurityWordPress Security 2014 - The Basics of Security
WordPress Security 2014 - The Basics of Security
 
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne BurkeExtreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
 
Joomladay Netherlands - Security
Joomladay Netherlands - SecurityJoomladay Netherlands - Security
Joomladay Netherlands - Security
 
#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...
#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...
#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...
 
RELEASE THE HOUNDS, PART 2: 9 YEARS IS A LONG ASS TIME
RELEASE THE HOUNDS, PART 2: 9 YEARS IS A LONG ASS TIMERELEASE THE HOUNDS, PART 2: 9 YEARS IS A LONG ASS TIME
RELEASE THE HOUNDS, PART 2: 9 YEARS IS A LONG ASS TIME
 
How to free your computer from virus-shara aguirre-director of happiness.m4v
How to free your computer from virus-shara aguirre-director of happiness.m4vHow to free your computer from virus-shara aguirre-director of happiness.m4v
How to free your computer from virus-shara aguirre-director of happiness.m4v
 
Instalar un grupo_y_excluir_otro
Instalar un grupo_y_excluir_otroInstalar un grupo_y_excluir_otro
Instalar un grupo_y_excluir_otro
 
Httpd sys content_t_apache_linux
Httpd sys content_t_apache_linuxHttpd sys content_t_apache_linux
Httpd sys content_t_apache_linux
 
Bug bounty or beg bounty?
Bug bounty or beg bounty?Bug bounty or beg bounty?
Bug bounty or beg bounty?
 
Instalar cliente bittorrent
Instalar cliente bittorrentInstalar cliente bittorrent
Instalar cliente bittorrent
 
WordPress Security - Learning From Hacks
WordPress Security - Learning From HacksWordPress Security - Learning From Hacks
WordPress Security - Learning From Hacks
 
10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security
 
Installar un paquete_rpm_linux
Installar un paquete_rpm_linuxInstallar un paquete_rpm_linux
Installar un paquete_rpm_linux
 
KEYNOTE: Nullcon 2021 - Security Research and Disclosure - The Unauthorized B...
KEYNOTE: Nullcon 2021 - Security Research and Disclosure - The Unauthorized B...KEYNOTE: Nullcon 2021 - Security Research and Disclosure - The Unauthorized B...
KEYNOTE: Nullcon 2021 - Security Research and Disclosure - The Unauthorized B...
 
Перевірка роботи McAfee ENS. MVISION Insights SUNBURST.
Перевірка роботи McAfee ENS. MVISION Insights SUNBURST.Перевірка роботи McAfee ENS. MVISION Insights SUNBURST.
Перевірка роботи McAfee ENS. MVISION Insights SUNBURST.
 
Community Career Center: The Beginner’s Guide to LastPass
Community Career Center: The Beginner’s Guide to LastPassCommunity Career Center: The Beginner’s Guide to LastPass
Community Career Center: The Beginner’s Guide to LastPass
 
Teknologi antivirus vs malware 2015 expanded
Teknologi antivirus vs malware 2015 expandedTeknologi antivirus vs malware 2015 expanded
Teknologi antivirus vs malware 2015 expanded
 

Destaque

Wilmshurst & Fryxell 1995
Wilmshurst & Fryxell 1995Wilmshurst & Fryxell 1995
Wilmshurst & Fryxell 1995
jfwilmshurst
 
NetVU Tech-4290/4390
NetVU Tech-4290/4390NetVU Tech-4290/4390
NetVU Tech-4290/4390
jreverri
 

Destaque (10)

Hydro power
Hydro powerHydro power
Hydro power
 
Global Health Action-Haiti
Global Health Action-HaitiGlobal Health Action-Haiti
Global Health Action-Haiti
 
Biogas Brochure
Biogas BrochureBiogas Brochure
Biogas Brochure
 
Wilmshurst & Fryxell 1995
Wilmshurst & Fryxell 1995Wilmshurst & Fryxell 1995
Wilmshurst & Fryxell 1995
 
So050 ben expertise_in_biofuels
So050 ben expertise_in_biofuelsSo050 ben expertise_in_biofuels
So050 ben expertise_in_biofuels
 
NetVU Tech-4290/4390
NetVU Tech-4290/4390NetVU Tech-4290/4390
NetVU Tech-4290/4390
 
S0601 b power
S0601 b powerS0601 b power
S0601 b power
 
So603 b incineration plant
So603 b incineration plantSo603 b incineration plant
So603 b incineration plant
 
Friends of search 2016 - een samenvatting in beeld
Friends of search 2016 - een samenvatting in beeldFriends of search 2016 - een samenvatting in beeld
Friends of search 2016 - een samenvatting in beeld
 
Solucionario 5to secundaria
Solucionario 5to secundaria Solucionario 5to secundaria
Solucionario 5to secundaria
 

Semelhante a NetVU Tech-4290/4390

One Trick 2 0 Tools Tds March 2011a
One Trick 2 0 Tools Tds March 2011aOne Trick 2 0 Tools Tds March 2011a
One Trick 2 0 Tools Tds March 2011a
Ann Walker Smalley
 
Niels G's security websites list
Niels G's security websites listNiels G's security websites list
Niels G's security websites list
Bill Hagestad II
 
Play withmultimedia mac
Play withmultimedia macPlay withmultimedia mac
Play withmultimedia mac
Maso Lin
 
Internetsafety networkedparent
Internetsafety networkedparentInternetsafety networkedparent
Internetsafety networkedparent
Karen Brooks
 

Semelhante a NetVU Tech-4290/4390 (20)

One Trick 2 0 Tools Tds March 2011a
One Trick 2 0 Tools Tds March 2011aOne Trick 2 0 Tools Tds March 2011a
One Trick 2 0 Tools Tds March 2011a
 
Niels G's security websites list
Niels G's security websites listNiels G's security websites list
Niels G's security websites list
 
Play withmultimedia mac
Play withmultimedia macPlay withmultimedia mac
Play withmultimedia mac
 
Ruby and Framework Security
Ruby and Framework SecurityRuby and Framework Security
Ruby and Framework Security
 
Security news 20151119
Security news 20151119Security news 20151119
Security news 20151119
 
BYOM Build Your Own Methodology (in Mobile Forensics)
BYOM Build Your Own Methodology (in Mobile Forensics)BYOM Build Your Own Methodology (in Mobile Forensics)
BYOM Build Your Own Methodology (in Mobile Forensics)
 
One Trick 2.0 Tools
One Trick 2.0 ToolsOne Trick 2.0 Tools
One Trick 2.0 Tools
 
WebDev References
WebDev ReferencesWebDev References
WebDev References
 
Cyber Security Workshop @SPIT- 3rd October 2015
Cyber Security Workshop @SPIT- 3rd October 2015Cyber Security Workshop @SPIT- 3rd October 2015
Cyber Security Workshop @SPIT- 3rd October 2015
 
Attack Chaining: Advanced Maneuvers for Hack Fu
Attack Chaining: Advanced Maneuvers for Hack FuAttack Chaining: Advanced Maneuvers for Hack Fu
Attack Chaining: Advanced Maneuvers for Hack Fu
 
Ferramentas de apoio ao desenvolvedor
Ferramentas de apoio ao desenvolvedorFerramentas de apoio ao desenvolvedor
Ferramentas de apoio ao desenvolvedor
 
Menggunakan Kali Linux Untuk Mengetahui Kelemahan Implementasi TI
Menggunakan Kali Linux Untuk  Mengetahui Kelemahan Implementasi TIMenggunakan Kali Linux Untuk  Mengetahui Kelemahan Implementasi TI
Menggunakan Kali Linux Untuk Mengetahui Kelemahan Implementasi TI
 
Web services and JavaScript
Web services and JavaScriptWeb services and JavaScript
Web services and JavaScript
 
Pwned in high ed
Pwned in high edPwned in high ed
Pwned in high ed
 
SWAT Style – Live Network Crypto Hacking and Exploitation by Kevin Cardwell a...
SWAT Style – Live Network Crypto Hacking and Exploitation by Kevin Cardwell a...SWAT Style – Live Network Crypto Hacking and Exploitation by Kevin Cardwell a...
SWAT Style – Live Network Crypto Hacking and Exploitation by Kevin Cardwell a...
 
Internetsafety networkedparent
Internetsafety networkedparentInternetsafety networkedparent
Internetsafety networkedparent
 
העתיד כבר כאן - שימוש בטכנולוגיות החדשות כבר היום
העתיד כבר כאן - שימוש בטכנולוגיות החדשות כבר היוםהעתיד כבר כאן - שימוש בטכנולוגיות החדשות כבר היום
העתיד כבר כאן - שימוש בטכנולוגיות החדשות כבר היום
 
モジュール指向勉強会-コードリーディングを始める前に-
モジュール指向勉強会-コードリーディングを始める前に-モジュール指向勉強会-コードリーディングを始める前に-
モジュール指向勉強会-コードリーディングを始める前に-
 
Distributed facilitation basics
Distributed facilitation basicsDistributed facilitation basics
Distributed facilitation basics
 
[IGC 2017] 잔디소프트 윤세민 - HTML5, 크로스플랫폼, 그리고 MMORPG feat. 매드월드
[IGC 2017] 잔디소프트 윤세민 - HTML5, 크로스플랫폼, 그리고 MMORPG feat. 매드월드[IGC 2017] 잔디소프트 윤세민 - HTML5, 크로스플랫폼, 그리고 MMORPG feat. 매드월드
[IGC 2017] 잔디소프트 윤세민 - HTML5, 크로스플랫폼, 그리고 MMORPG feat. 매드월드
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 

NetVU Tech-4290/4390

  • 1. Securing Your Network TECH Class 4290/4390 Presented by: Vince Ada & Jason Reverri
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17. Sans Internet Storm Center http://isc.sans.org Sans Reading Room http://www.sans.org/reading_room/ Microsoft Malware Protection Center http://blogs.technet.com/b/mmpc/ Darknet http://www.darknet.org.uk/ Packetlife http://packetlife.net/blog/ SecLists.org Security Mailing List Archive http://www.seclists.org PaulDotCom http://www.pauldotcom.com/ Schneier on Security http://www.schneier.com/ Paul de Souza http://paulcsfi.wordpress.com/ 2600 updates http://www.2600.com/rss.xml SecurityTube http://www.securitytube.net CommandLine Kung FU http://blog.commandlinekungfu.com Offensive Security http://www.offensive-security.com Google Online Security Blog http://googleonlinesecurity.blogspot.com Metasploit Unleashed http://www.offensive-security.com/metasploit- Irongeek unleashed/Metasploit_Unleashed_Information_Security_Training http://www.irongeek.com Metasploit 101 Jeremiah Grossman (Whitehat Security) http://www.securitytube.net/video/786 http://jeremiahgrossman.blogspot.com BackTrack Linux Brian Krebs http://www.backtrack-linux.org/ http://krebsonsecurity.com Great video presentation by Dave Marcus on social networks social SC Magazine engineering: http://www.scmagazineus.com http://www.irongeek.com/i.php?page=videos/dojocon-2010- videos#Using%20Social%20Networks%20To%20Profile,%20Find McAfee Labs %20and%200wn%20Your%20Victims http://blogs.mcafee.com/mcafee-labs
  • 18. Photo Credits Slide 2 http://www.flickr.com/photos/walkinline/ Slide 3 http://www.flickr.com/photos/billyboysfotocolection/ Slide 5 http://www.flickr.com/photos/christianpayne/ Slide 8 http://www.flickr.com/photos/sprengben/ Slide 10 http://www.flickr.com/photos/giantginkgo/ Slide 11 http://www.flickr.com/photos/ignacio_conejo/ Slide 12 http://www.flickr.com/photos/home_of_chaos/ Slide 13 http://www.flickr.com/photos/sklathill Slide 14 http://www.flickr.com/photos/donsolo/ Slide 15 http://www.flickr.com/photos/mr_beaver/ Slide 16 http://www.flickr.com/photos/schmiegl/ Slide 17 http://www.flickr.com/photos/60295308@N00 Photos used under Creative Commons license