SlideShare una empresa de Scribd logo
1 de 18
Descargar para leer sin conexión
Securing Your Network
TECH Class 4290/4390
          Presented by:
   Vince Ada & Jason Reverri
Sans Internet Storm Center
http://isc.sans.org

Sans Reading Room
http://www.sans.org/reading_room/            Microsoft Malware Protection Center
                                             http://blogs.technet.com/b/mmpc/
Darknet
http://www.darknet.org.uk/                   Packetlife
                                             http://packetlife.net/blog/
SecLists.org Security Mailing List Archive
http://www.seclists.org                      PaulDotCom
                                             http://www.pauldotcom.com/
Schneier on Security
http://www.schneier.com/                     Paul de Souza
                                             http://paulcsfi.wordpress.com/
2600 updates
http://www.2600.com/rss.xml                  SecurityTube
                                             http://www.securitytube.net
CommandLine Kung FU
http://blog.commandlinekungfu.com            Offensive Security
                                             http://www.offensive-security.com
Google Online Security Blog
http://googleonlinesecurity.blogspot.com     Metasploit Unleashed
                                             http://www.offensive-security.com/metasploit-
Irongeek                                     unleashed/Metasploit_Unleashed_Information_Security_Training
http://www.irongeek.com
                                             Metasploit 101
Jeremiah Grossman (Whitehat Security)        http://www.securitytube.net/video/786
http://jeremiahgrossman.blogspot.com
                                             BackTrack Linux
Brian Krebs                                  http://www.backtrack-linux.org/
http://krebsonsecurity.com
                                             Great video presentation by Dave Marcus on social networks social
SC Magazine                                  engineering:
http://www.scmagazineus.com                  http://www.irongeek.com/i.php?page=videos/dojocon-2010-
                                             videos#Using%20Social%20Networks%20To%20Profile,%20Find
McAfee Labs                                  %20and%200wn%20Your%20Victims
http://blogs.mcafee.com/mcafee-labs
Photo Credits

Slide 2 http://www.flickr.com/photos/walkinline/
Slide 3 http://www.flickr.com/photos/billyboysfotocolection/
Slide 5 http://www.flickr.com/photos/christianpayne/
Slide 8 http://www.flickr.com/photos/sprengben/
Slide 10 http://www.flickr.com/photos/giantginkgo/
Slide 11 http://www.flickr.com/photos/ignacio_conejo/
Slide 12 http://www.flickr.com/photos/home_of_chaos/
Slide 13 http://www.flickr.com/photos/sklathill
Slide 14 http://www.flickr.com/photos/donsolo/
Slide 15 http://www.flickr.com/photos/mr_beaver/
Slide 16 http://www.flickr.com/photos/schmiegl/
Slide 17 http://www.flickr.com/photos/60295308@N00

Photos used under Creative Commons license

Más contenido relacionado

La actualidad más candente

WordPress Security 2014 - The Basics of Security
WordPress Security 2014 - The Basics of SecurityWordPress Security 2014 - The Basics of Security
WordPress Security 2014 - The Basics of Security
Tony Perez
 
Instalar un grupo_y_excluir_otro
Instalar un grupo_y_excluir_otroInstalar un grupo_y_excluir_otro
Instalar un grupo_y_excluir_otro
James Jara
 
Httpd sys content_t_apache_linux
Httpd sys content_t_apache_linuxHttpd sys content_t_apache_linux
Httpd sys content_t_apache_linux
James Jara
 
Instalar cliente bittorrent
Instalar cliente bittorrentInstalar cliente bittorrent
Instalar cliente bittorrent
James Jara
 
WordPress Security - Learning From Hacks
WordPress Security - Learning From HacksWordPress Security - Learning From Hacks
WordPress Security - Learning From Hacks
Tony Perez
 
Installar un paquete_rpm_linux
Installar un paquete_rpm_linuxInstallar un paquete_rpm_linux
Installar un paquete_rpm_linux
James Jara
 

La actualidad más candente (20)

Corncon 2021 - Inside the Unlikely Romance
Corncon 2021 - Inside the Unlikely RomanceCorncon 2021 - Inside the Unlikely Romance
Corncon 2021 - Inside the Unlikely Romance
 
TechCrunch Early Stage 2020 - How to prioritize security at your startup
TechCrunch Early Stage 2020 - How to prioritize security at your startupTechCrunch Early Stage 2020 - How to prioritize security at your startup
TechCrunch Early Stage 2020 - How to prioritize security at your startup
 
Photosynth Introduction
Photosynth IntroductionPhotosynth Introduction
Photosynth Introduction
 
WordPress Security 2014 - The Basics of Security
WordPress Security 2014 - The Basics of SecurityWordPress Security 2014 - The Basics of Security
WordPress Security 2014 - The Basics of Security
 
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne BurkeExtreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
 
Joomladay Netherlands - Security
Joomladay Netherlands - SecurityJoomladay Netherlands - Security
Joomladay Netherlands - Security
 
#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...
#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...
#AusCERT2021 - Inside The Unlikely Romance Crowdsourced Security from a Finan...
 
RELEASE THE HOUNDS, PART 2: 9 YEARS IS A LONG ASS TIME
RELEASE THE HOUNDS, PART 2: 9 YEARS IS A LONG ASS TIMERELEASE THE HOUNDS, PART 2: 9 YEARS IS A LONG ASS TIME
RELEASE THE HOUNDS, PART 2: 9 YEARS IS A LONG ASS TIME
 
How to free your computer from virus-shara aguirre-director of happiness.m4v
How to free your computer from virus-shara aguirre-director of happiness.m4vHow to free your computer from virus-shara aguirre-director of happiness.m4v
How to free your computer from virus-shara aguirre-director of happiness.m4v
 
Instalar un grupo_y_excluir_otro
Instalar un grupo_y_excluir_otroInstalar un grupo_y_excluir_otro
Instalar un grupo_y_excluir_otro
 
Httpd sys content_t_apache_linux
Httpd sys content_t_apache_linuxHttpd sys content_t_apache_linux
Httpd sys content_t_apache_linux
 
Bug bounty or beg bounty?
Bug bounty or beg bounty?Bug bounty or beg bounty?
Bug bounty or beg bounty?
 
Instalar cliente bittorrent
Instalar cliente bittorrentInstalar cliente bittorrent
Instalar cliente bittorrent
 
WordPress Security - Learning From Hacks
WordPress Security - Learning From HacksWordPress Security - Learning From Hacks
WordPress Security - Learning From Hacks
 
10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security
 
Installar un paquete_rpm_linux
Installar un paquete_rpm_linuxInstallar un paquete_rpm_linux
Installar un paquete_rpm_linux
 
KEYNOTE: Nullcon 2021 - Security Research and Disclosure - The Unauthorized B...
KEYNOTE: Nullcon 2021 - Security Research and Disclosure - The Unauthorized B...KEYNOTE: Nullcon 2021 - Security Research and Disclosure - The Unauthorized B...
KEYNOTE: Nullcon 2021 - Security Research and Disclosure - The Unauthorized B...
 
Перевірка роботи McAfee ENS. MVISION Insights SUNBURST.
Перевірка роботи McAfee ENS. MVISION Insights SUNBURST.Перевірка роботи McAfee ENS. MVISION Insights SUNBURST.
Перевірка роботи McAfee ENS. MVISION Insights SUNBURST.
 
Community Career Center: The Beginner’s Guide to LastPass
Community Career Center: The Beginner’s Guide to LastPassCommunity Career Center: The Beginner’s Guide to LastPass
Community Career Center: The Beginner’s Guide to LastPass
 
Teknologi antivirus vs malware 2015 expanded
Teknologi antivirus vs malware 2015 expandedTeknologi antivirus vs malware 2015 expanded
Teknologi antivirus vs malware 2015 expanded
 

Destacado

Wilmshurst & Fryxell 1995
Wilmshurst & Fryxell 1995Wilmshurst & Fryxell 1995
Wilmshurst & Fryxell 1995
jfwilmshurst
 
NetVU Tech-4290/4390
NetVU Tech-4290/4390NetVU Tech-4290/4390
NetVU Tech-4290/4390
jreverri
 

Destacado (10)

Hydro power
Hydro powerHydro power
Hydro power
 
Global Health Action-Haiti
Global Health Action-HaitiGlobal Health Action-Haiti
Global Health Action-Haiti
 
Biogas Brochure
Biogas BrochureBiogas Brochure
Biogas Brochure
 
Wilmshurst & Fryxell 1995
Wilmshurst & Fryxell 1995Wilmshurst & Fryxell 1995
Wilmshurst & Fryxell 1995
 
So050 ben expertise_in_biofuels
So050 ben expertise_in_biofuelsSo050 ben expertise_in_biofuels
So050 ben expertise_in_biofuels
 
NetVU Tech-4290/4390
NetVU Tech-4290/4390NetVU Tech-4290/4390
NetVU Tech-4290/4390
 
S0601 b power
S0601 b powerS0601 b power
S0601 b power
 
So603 b incineration plant
So603 b incineration plantSo603 b incineration plant
So603 b incineration plant
 
Friends of search 2016 - een samenvatting in beeld
Friends of search 2016 - een samenvatting in beeldFriends of search 2016 - een samenvatting in beeld
Friends of search 2016 - een samenvatting in beeld
 
Solucionario 5to secundaria
Solucionario 5to secundaria Solucionario 5to secundaria
Solucionario 5to secundaria
 

Similar a NetVU Tech-4290/4390

One Trick 2 0 Tools Tds March 2011a
One Trick 2 0 Tools Tds March 2011aOne Trick 2 0 Tools Tds March 2011a
One Trick 2 0 Tools Tds March 2011a
Ann Walker Smalley
 
Niels G's security websites list
Niels G's security websites listNiels G's security websites list
Niels G's security websites list
Bill Hagestad II
 
Play withmultimedia mac
Play withmultimedia macPlay withmultimedia mac
Play withmultimedia mac
Maso Lin
 
Internetsafety networkedparent
Internetsafety networkedparentInternetsafety networkedparent
Internetsafety networkedparent
Karen Brooks
 

Similar a NetVU Tech-4290/4390 (20)

One Trick 2 0 Tools Tds March 2011a
One Trick 2 0 Tools Tds March 2011aOne Trick 2 0 Tools Tds March 2011a
One Trick 2 0 Tools Tds March 2011a
 
Niels G's security websites list
Niels G's security websites listNiels G's security websites list
Niels G's security websites list
 
Play withmultimedia mac
Play withmultimedia macPlay withmultimedia mac
Play withmultimedia mac
 
Ruby and Framework Security
Ruby and Framework SecurityRuby and Framework Security
Ruby and Framework Security
 
Security news 20151119
Security news 20151119Security news 20151119
Security news 20151119
 
BYOM Build Your Own Methodology (in Mobile Forensics)
BYOM Build Your Own Methodology (in Mobile Forensics)BYOM Build Your Own Methodology (in Mobile Forensics)
BYOM Build Your Own Methodology (in Mobile Forensics)
 
One Trick 2.0 Tools
One Trick 2.0 ToolsOne Trick 2.0 Tools
One Trick 2.0 Tools
 
WebDev References
WebDev ReferencesWebDev References
WebDev References
 
Cyber Security Workshop @SPIT- 3rd October 2015
Cyber Security Workshop @SPIT- 3rd October 2015Cyber Security Workshop @SPIT- 3rd October 2015
Cyber Security Workshop @SPIT- 3rd October 2015
 
Attack Chaining: Advanced Maneuvers for Hack Fu
Attack Chaining: Advanced Maneuvers for Hack FuAttack Chaining: Advanced Maneuvers for Hack Fu
Attack Chaining: Advanced Maneuvers for Hack Fu
 
Ferramentas de apoio ao desenvolvedor
Ferramentas de apoio ao desenvolvedorFerramentas de apoio ao desenvolvedor
Ferramentas de apoio ao desenvolvedor
 
Menggunakan Kali Linux Untuk Mengetahui Kelemahan Implementasi TI
Menggunakan Kali Linux Untuk  Mengetahui Kelemahan Implementasi TIMenggunakan Kali Linux Untuk  Mengetahui Kelemahan Implementasi TI
Menggunakan Kali Linux Untuk Mengetahui Kelemahan Implementasi TI
 
Web services and JavaScript
Web services and JavaScriptWeb services and JavaScript
Web services and JavaScript
 
Pwned in high ed
Pwned in high edPwned in high ed
Pwned in high ed
 
SWAT Style – Live Network Crypto Hacking and Exploitation by Kevin Cardwell a...
SWAT Style – Live Network Crypto Hacking and Exploitation by Kevin Cardwell a...SWAT Style – Live Network Crypto Hacking and Exploitation by Kevin Cardwell a...
SWAT Style – Live Network Crypto Hacking and Exploitation by Kevin Cardwell a...
 
Internetsafety networkedparent
Internetsafety networkedparentInternetsafety networkedparent
Internetsafety networkedparent
 
העתיד כבר כאן - שימוש בטכנולוגיות החדשות כבר היום
העתיד כבר כאן - שימוש בטכנולוגיות החדשות כבר היוםהעתיד כבר כאן - שימוש בטכנולוגיות החדשות כבר היום
העתיד כבר כאן - שימוש בטכנולוגיות החדשות כבר היום
 
モジュール指向勉強会-コードリーディングを始める前に-
モジュール指向勉強会-コードリーディングを始める前に-モジュール指向勉強会-コードリーディングを始める前に-
モジュール指向勉強会-コードリーディングを始める前に-
 
Distributed facilitation basics
Distributed facilitation basicsDistributed facilitation basics
Distributed facilitation basics
 
[IGC 2017] 잔디소프트 윤세민 - HTML5, 크로스플랫폼, 그리고 MMORPG feat. 매드월드
[IGC 2017] 잔디소프트 윤세민 - HTML5, 크로스플랫폼, 그리고 MMORPG feat. 매드월드[IGC 2017] 잔디소프트 윤세민 - HTML5, 크로스플랫폼, 그리고 MMORPG feat. 매드월드
[IGC 2017] 잔디소프트 윤세민 - HTML5, 크로스플랫폼, 그리고 MMORPG feat. 매드월드
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

NetVU Tech-4290/4390

  • 1. Securing Your Network TECH Class 4290/4390 Presented by: Vince Ada & Jason Reverri
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17. Sans Internet Storm Center http://isc.sans.org Sans Reading Room http://www.sans.org/reading_room/ Microsoft Malware Protection Center http://blogs.technet.com/b/mmpc/ Darknet http://www.darknet.org.uk/ Packetlife http://packetlife.net/blog/ SecLists.org Security Mailing List Archive http://www.seclists.org PaulDotCom http://www.pauldotcom.com/ Schneier on Security http://www.schneier.com/ Paul de Souza http://paulcsfi.wordpress.com/ 2600 updates http://www.2600.com/rss.xml SecurityTube http://www.securitytube.net CommandLine Kung FU http://blog.commandlinekungfu.com Offensive Security http://www.offensive-security.com Google Online Security Blog http://googleonlinesecurity.blogspot.com Metasploit Unleashed http://www.offensive-security.com/metasploit- Irongeek unleashed/Metasploit_Unleashed_Information_Security_Training http://www.irongeek.com Metasploit 101 Jeremiah Grossman (Whitehat Security) http://www.securitytube.net/video/786 http://jeremiahgrossman.blogspot.com BackTrack Linux Brian Krebs http://www.backtrack-linux.org/ http://krebsonsecurity.com Great video presentation by Dave Marcus on social networks social SC Magazine engineering: http://www.scmagazineus.com http://www.irongeek.com/i.php?page=videos/dojocon-2010- videos#Using%20Social%20Networks%20To%20Profile,%20Find McAfee Labs %20and%200wn%20Your%20Victims http://blogs.mcafee.com/mcafee-labs
  • 18. Photo Credits Slide 2 http://www.flickr.com/photos/walkinline/ Slide 3 http://www.flickr.com/photos/billyboysfotocolection/ Slide 5 http://www.flickr.com/photos/christianpayne/ Slide 8 http://www.flickr.com/photos/sprengben/ Slide 10 http://www.flickr.com/photos/giantginkgo/ Slide 11 http://www.flickr.com/photos/ignacio_conejo/ Slide 12 http://www.flickr.com/photos/home_of_chaos/ Slide 13 http://www.flickr.com/photos/sklathill Slide 14 http://www.flickr.com/photos/donsolo/ Slide 15 http://www.flickr.com/photos/mr_beaver/ Slide 16 http://www.flickr.com/photos/schmiegl/ Slide 17 http://www.flickr.com/photos/60295308@N00 Photos used under Creative Commons license