akde/infosec

Information security is ultimately about managing risk


Case: Ransomware

  • Most­ly, the encryp­tion and dis­tri­b­u­tion was done before the ran­some mes­sage appeared.
  • Check in which sub­nets (net­work seg­men­ta­tion) the host is and to which oth­er sys­tems it has connections.
  • Check logs / exter­nal loghosts
  • Ask employ­ee if there were unusu­al occurences.

Leave a Reply

About

Personal collection of some infosec stuff. Primary purpose of this site is to collect and organize for myself.

Note: Some content is not publicly visible due to copyright issues. Therefore, some links could be broken.

Checklists

Categories

Checklists: Ports

python -c 'import pty;pty.spawn("/bin/bash")';

python3 -c 'import pty;pty.spawn("/bin/bash")';