SlideShare une entreprise Scribd logo
1  sur  18
Télécharger pour lire hors ligne
Securing Your Network
TECH Class 4290/4390
          Presented by:
   Vince Ada & Jason Reverri
Sans Internet Storm Center
http://isc.sans.org

Sans Reading Room
http://www.sans.org/reading_room/            Microsoft Malware Protection Center
                                             http://blogs.technet.com/b/mmpc/
Darknet
http://www.darknet.org.uk/                   Packetlife
                                             http://packetlife.net/blog/
SecLists.org Security Mailing List Archive
http://www.seclists.org                      PaulDotCom
                                             http://www.pauldotcom.com/
Schneier on Security
http://www.schneier.com/                     Paul de Souza
                                             http://paulcsfi.wordpress.com/
2600 updates
http://www.2600.com/rss.xml                  SecurityTube
                                             http://www.securitytube.net
CommandLine Kung FU
http://blog.commandlinekungfu.com            Offensive Security
                                             http://www.offensive-security.com
Google Online Security Blog
http://googleonlinesecurity.blogspot.com     Metasploit Unleashed
                                             http://www.offensive-security.com/metasploit-
Irongeek                                     unleashed/Metasploit_Unleashed_Information_Security_Training
http://www.irongeek.com
                                             Metasploit 101
Jeremiah Grossman (Whitehat Security)        http://www.securitytube.net/video/786
http://jeremiahgrossman.blogspot.com
                                             BackTrack Linux
Brian Krebs                                  http://www.backtrack-linux.org/
http://krebsonsecurity.com
                                             Great video presentation by Dave Marcus on social networks social
SC Magazine                                  engineering:
http://www.scmagazineus.com                  http://www.irongeek.com/i.php?page=videos/dojocon-2010-
                                             videos#Using%20Social%20Networks%20To%20Profile,%20Find
McAfee Labs                                  %20and%200wn%20Your%20Victims
http://blogs.mcafee.com/mcafee-labs
Photo Credits

Slide 2 http://www.flickr.com/photos/walkinline/
Slide 3 http://www.flickr.com/photos/billyboysfotocolection/
Slide 5 http://www.flickr.com/photos/christianpayne/
Slide 8 http://www.flickr.com/photos/sprengben/
Slide 10 http://www.flickr.com/photos/giantginkgo/
Slide 11 http://www.flickr.com/photos/ignacio_conejo/
Slide 12 http://www.flickr.com/photos/home_of_chaos/
Slide 13 http://www.flickr.com/photos/sklathill
Slide 14 http://www.flickr.com/photos/donsolo/
Slide 15 http://www.flickr.com/photos/mr_beaver/
Slide 16 http://www.flickr.com/photos/schmiegl/
Slide 17 http://www.flickr.com/photos/60295308@N00

Photos used under Creative Commons license

Contenu connexe

Tendances

WordPress Security 2014 - The Basics of Security
WordPress Security 2014 - The Basics of SecurityWordPress Security 2014 - The Basics of Security
WordPress Security 2014 - The Basics of Security
Tony Perez
 
Instalar un grupo_y_excluir_otro
Instalar un grupo_y_excluir_otroInstalar un grupo_y_excluir_otro
Instalar un grupo_y_excluir_otro
James Jara
 
Httpd sys content_t_apache_linux
Httpd sys content_t_apache_linuxHttpd sys content_t_apache_linux
Httpd sys content_t_apache_linux
James Jara
 
Instalar cliente bittorrent
Instalar cliente bittorrentInstalar cliente bittorrent
Instalar cliente bittorrent
James Jara
 
WordPress Security - Learning From Hacks
WordPress Security - Learning From HacksWordPress Security - Learning From Hacks
WordPress Security - Learning From Hacks
Tony Perez
 
Installar un paquete_rpm_linux
Installar un paquete_rpm_linuxInstallar un paquete_rpm_linux
Installar un paquete_rpm_linux
James Jara
 

Tendances (20)

Corncon 2021 - Inside the Unlikely Romance
Corncon 2021 - Inside the Unlikely RomanceCorncon 2021 - Inside the Unlikely Romance
Corncon 2021 - Inside the Unlikely Romance
 
TechCrunch Early Stage 2020 - How to prioritize security at your startup
TechCrunch Early Stage 2020 - How to prioritize security at your startupTechCrunch Early Stage 2020 - How to prioritize security at your startup
TechCrunch Early Stage 2020 - How to prioritize security at your startup
 
Photosynth Introduction
Photosynth IntroductionPhotosynth Introduction
Photosynth Introduction
 
WordPress Security 2014 - The Basics of Security
WordPress Security 2014 - The Basics of SecurityWordPress Security 2014 - The Basics of Security
WordPress Security 2014 - The Basics of Security
 
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne BurkeExtreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
 
Joomladay Netherlands - Security
Joomladay Netherlands - SecurityJoomladay Netherlands - Security
Joomladay Netherlands - Security
 
#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...
#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...
#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...
 
RELEASE THE HOUNDS, PART 2: 9 YEARS IS A LONG ASS TIME
RELEASE THE HOUNDS, PART 2: 9 YEARS IS A LONG ASS TIMERELEASE THE HOUNDS, PART 2: 9 YEARS IS A LONG ASS TIME
RELEASE THE HOUNDS, PART 2: 9 YEARS IS A LONG ASS TIME
 
How to free your computer from virus-shara aguirre-director of happiness.m4v
How to free your computer from virus-shara aguirre-director of happiness.m4vHow to free your computer from virus-shara aguirre-director of happiness.m4v
How to free your computer from virus-shara aguirre-director of happiness.m4v
 
Instalar un grupo_y_excluir_otro
Instalar un grupo_y_excluir_otroInstalar un grupo_y_excluir_otro
Instalar un grupo_y_excluir_otro
 
Httpd sys content_t_apache_linux
Httpd sys content_t_apache_linuxHttpd sys content_t_apache_linux
Httpd sys content_t_apache_linux
 
Bug bounty or beg bounty?
Bug bounty or beg bounty?Bug bounty or beg bounty?
Bug bounty or beg bounty?
 
Instalar cliente bittorrent
Instalar cliente bittorrentInstalar cliente bittorrent
Instalar cliente bittorrent
 
WordPress Security - Learning From Hacks
WordPress Security - Learning From HacksWordPress Security - Learning From Hacks
WordPress Security - Learning From Hacks
 
10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security
 
Installar un paquete_rpm_linux
Installar un paquete_rpm_linuxInstallar un paquete_rpm_linux
Installar un paquete_rpm_linux
 
KEYNOTE: Nullcon 2021 - Security Research and Disclosure - The Unauthorized B...
KEYNOTE: Nullcon 2021 - Security Research and Disclosure - The Unauthorized B...KEYNOTE: Nullcon 2021 - Security Research and Disclosure - The Unauthorized B...
KEYNOTE: Nullcon 2021 - Security Research and Disclosure - The Unauthorized B...
 
Перевірка роботи McAfee ENS. MVISION Insights SUNBURST.
Перевірка роботи McAfee ENS. MVISION Insights SUNBURST.Перевірка роботи McAfee ENS. MVISION Insights SUNBURST.
Перевірка роботи McAfee ENS. MVISION Insights SUNBURST.
 
Community Career Center: The Beginner’s Guide to LastPass
Community Career Center: The Beginner’s Guide to LastPassCommunity Career Center: The Beginner’s Guide to LastPass
Community Career Center: The Beginner’s Guide to LastPass
 
Teknologi antivirus vs malware 2015 expanded
Teknologi antivirus vs malware 2015 expandedTeknologi antivirus vs malware 2015 expanded
Teknologi antivirus vs malware 2015 expanded
 

En vedette

Wilmshurst & Fryxell 1995
Wilmshurst & Fryxell 1995Wilmshurst & Fryxell 1995
Wilmshurst & Fryxell 1995
jfwilmshurst
 
NetVU Tech-4290/4390
NetVU Tech-4290/4390NetVU Tech-4290/4390
NetVU Tech-4290/4390
jreverri
 

En vedette (10)

Hydro power
Hydro powerHydro power
Hydro power
 
Global Health Action-Haiti
Global Health Action-HaitiGlobal Health Action-Haiti
Global Health Action-Haiti
 
Biogas Brochure
Biogas BrochureBiogas Brochure
Biogas Brochure
 
Wilmshurst & Fryxell 1995
Wilmshurst & Fryxell 1995Wilmshurst & Fryxell 1995
Wilmshurst & Fryxell 1995
 
So050 ben expertise_in_biofuels
So050 ben expertise_in_biofuelsSo050 ben expertise_in_biofuels
So050 ben expertise_in_biofuels
 
NetVU Tech-4290/4390
NetVU Tech-4290/4390NetVU Tech-4290/4390
NetVU Tech-4290/4390
 
S0601 b power
S0601 b powerS0601 b power
S0601 b power
 
So603 b incineration plant
So603 b incineration plantSo603 b incineration plant
So603 b incineration plant
 
Friends of search 2016 - een samenvatting in beeld
Friends of search 2016 - een samenvatting in beeldFriends of search 2016 - een samenvatting in beeld
Friends of search 2016 - een samenvatting in beeld
 
Solucionario 5to secundaria
Solucionario 5to secundaria Solucionario 5to secundaria
Solucionario 5to secundaria
 

Similaire à NetVU Tech-4290/4390

One Trick 2 0 Tools Tds March 2011a
One Trick 2 0 Tools Tds March 2011aOne Trick 2 0 Tools Tds March 2011a
One Trick 2 0 Tools Tds March 2011a
Ann Walker Smalley
 
Niels G's security websites list
Niels G's security websites listNiels G's security websites list
Niels G's security websites list
Bill Hagestad II
 
Play withmultimedia mac
Play withmultimedia macPlay withmultimedia mac
Play withmultimedia mac
Maso Lin
 
Internetsafety networkedparent
Internetsafety networkedparentInternetsafety networkedparent
Internetsafety networkedparent
Karen Brooks
 

Similaire à NetVU Tech-4290/4390 (20)

One Trick 2 0 Tools Tds March 2011a
One Trick 2 0 Tools Tds March 2011aOne Trick 2 0 Tools Tds March 2011a
One Trick 2 0 Tools Tds March 2011a
 
Niels G's security websites list
Niels G's security websites listNiels G's security websites list
Niels G's security websites list
 
Play withmultimedia mac
Play withmultimedia macPlay withmultimedia mac
Play withmultimedia mac
 
Ruby and Framework Security
Ruby and Framework SecurityRuby and Framework Security
Ruby and Framework Security
 
Security news 20151119
Security news 20151119Security news 20151119
Security news 20151119
 
BYOM Build Your Own Methodology (in Mobile Forensics)
BYOM Build Your Own Methodology (in Mobile Forensics)BYOM Build Your Own Methodology (in Mobile Forensics)
BYOM Build Your Own Methodology (in Mobile Forensics)
 
One Trick 2.0 Tools
One Trick 2.0 ToolsOne Trick 2.0 Tools
One Trick 2.0 Tools
 
WebDev References
WebDev ReferencesWebDev References
WebDev References
 
Cyber Security Workshop @SPIT- 3rd October 2015
Cyber Security Workshop @SPIT- 3rd October 2015Cyber Security Workshop @SPIT- 3rd October 2015
Cyber Security Workshop @SPIT- 3rd October 2015
 
Attack Chaining: Advanced Maneuvers for Hack Fu
Attack Chaining: Advanced Maneuvers for Hack FuAttack Chaining: Advanced Maneuvers for Hack Fu
Attack Chaining: Advanced Maneuvers for Hack Fu
 
Ferramentas de apoio ao desenvolvedor
Ferramentas de apoio ao desenvolvedorFerramentas de apoio ao desenvolvedor
Ferramentas de apoio ao desenvolvedor
 
Menggunakan Kali Linux Untuk Mengetahui Kelemahan Implementasi TI
Menggunakan Kali Linux Untuk  Mengetahui Kelemahan Implementasi TIMenggunakan Kali Linux Untuk  Mengetahui Kelemahan Implementasi TI
Menggunakan Kali Linux Untuk Mengetahui Kelemahan Implementasi TI
 
Web services and JavaScript
Web services and JavaScriptWeb services and JavaScript
Web services and JavaScript
 
Pwned in high ed
Pwned in high edPwned in high ed
Pwned in high ed
 
SWAT Style – Live Network Crypto Hacking and Exploitation by Kevin Cardwell a...
SWAT Style – Live Network Crypto Hacking and Exploitation by Kevin Cardwell a...SWAT Style – Live Network Crypto Hacking and Exploitation by Kevin Cardwell a...
SWAT Style – Live Network Crypto Hacking and Exploitation by Kevin Cardwell a...
 
Internetsafety networkedparent
Internetsafety networkedparentInternetsafety networkedparent
Internetsafety networkedparent
 
העתיד כבר כאן - שימוש בטכנולוגיות החדשות כבר היום
העתיד כבר כאן - שימוש בטכנולוגיות החדשות כבר היוםהעתיד כבר כאן - שימוש בטכנולוגיות החדשות כבר היום
העתיד כבר כאן - שימוש בטכנולוגיות החדשות כבר היום
 
モジュール指向勉強会-コードリーディングを始める前に-
モジュール指向勉強会-コードリーディングを始める前に-モジュール指向勉強会-コードリーディングを始める前に-
モジュール指向勉強会-コードリーディングを始める前に-
 
Distributed facilitation basics
Distributed facilitation basicsDistributed facilitation basics
Distributed facilitation basics
 
[IGC 2017] 잔디소프트 윤세민 - HTML5, 크로스플랫폼, 그리고 MMORPG feat. 매드월드
[IGC 2017] 잔디소프트 윤세민 - HTML5, 크로스플랫폼, 그리고 MMORPG feat. 매드월드[IGC 2017] 잔디소프트 윤세민 - HTML5, 크로스플랫폼, 그리고 MMORPG feat. 매드월드
[IGC 2017] 잔디소프트 윤세민 - HTML5, 크로스플랫폼, 그리고 MMORPG feat. 매드월드
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

NetVU Tech-4290/4390

  • 1. Securing Your Network TECH Class 4290/4390 Presented by: Vince Ada & Jason Reverri
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17. Sans Internet Storm Center http://isc.sans.org Sans Reading Room http://www.sans.org/reading_room/ Microsoft Malware Protection Center http://blogs.technet.com/b/mmpc/ Darknet http://www.darknet.org.uk/ Packetlife http://packetlife.net/blog/ SecLists.org Security Mailing List Archive http://www.seclists.org PaulDotCom http://www.pauldotcom.com/ Schneier on Security http://www.schneier.com/ Paul de Souza http://paulcsfi.wordpress.com/ 2600 updates http://www.2600.com/rss.xml SecurityTube http://www.securitytube.net CommandLine Kung FU http://blog.commandlinekungfu.com Offensive Security http://www.offensive-security.com Google Online Security Blog http://googleonlinesecurity.blogspot.com Metasploit Unleashed http://www.offensive-security.com/metasploit- Irongeek unleashed/Metasploit_Unleashed_Information_Security_Training http://www.irongeek.com Metasploit 101 Jeremiah Grossman (Whitehat Security) http://www.securitytube.net/video/786 http://jeremiahgrossman.blogspot.com BackTrack Linux Brian Krebs http://www.backtrack-linux.org/ http://krebsonsecurity.com Great video presentation by Dave Marcus on social networks social SC Magazine engineering: http://www.scmagazineus.com http://www.irongeek.com/i.php?page=videos/dojocon-2010- videos#Using%20Social%20Networks%20To%20Profile,%20Find McAfee Labs %20and%200wn%20Your%20Victims http://blogs.mcafee.com/mcafee-labs
  • 18. Photo Credits Slide 2 http://www.flickr.com/photos/walkinline/ Slide 3 http://www.flickr.com/photos/billyboysfotocolection/ Slide 5 http://www.flickr.com/photos/christianpayne/ Slide 8 http://www.flickr.com/photos/sprengben/ Slide 10 http://www.flickr.com/photos/giantginkgo/ Slide 11 http://www.flickr.com/photos/ignacio_conejo/ Slide 12 http://www.flickr.com/photos/home_of_chaos/ Slide 13 http://www.flickr.com/photos/sklathill Slide 14 http://www.flickr.com/photos/donsolo/ Slide 15 http://www.flickr.com/photos/mr_beaver/ Slide 16 http://www.flickr.com/photos/schmiegl/ Slide 17 http://www.flickr.com/photos/60295308@N00 Photos used under Creative Commons license