CISC 6680 Lecture Notes - Lecture 11: Digital Signature, Ntfs, Whitelist

16 views4 pages

Document Summary

Endpoint security defenses: anti-virus, high level overview, one of most popular security tools. Is approach to deny all software on system except for specifically allowed software. Manager), providing it a specific location (dns/ip address) that will be whitelisted to allow software installation: monitor path of least resistance for malware, create tighter controls around apps which interact directly w/ Internet/receives info from outside sources: alternate data stream zone id indicates network zone, use windows event logs to categorize source of traffic being investigated, prevents execution of unknown binaries & can lead to investigation. Is technical control which also enables policy control determining why unknown binary attempted execution: block can indicate compromised machine, endpoint forensics. & interactive logons is pass the hash: leverages compromised hashes to remotely access other systems, synchronized accounts & lack of salts contribute to the success of this attack, commonly used to pivot in windows where ntlm is supported.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents