Incident Handling

My notes on the SANS 504 Hacker Techniques, Exploits & Incident Handling. This course includes various techniques a hacker user to intrude from hacker perspective and counter measures an Incident handler should workout for protection


Hacker Techniques & Incident Handling Notes

Seven Steps to Creating an Effective Computer Security Incident Response Team

small-business-budget-implementation-20-security-controls

Business Case for getting budget for Security

 

NIST Patch Management Guide  

Practical Patch Management (SANS)

 

windows-memory-analysis-and-forensics Notes

Incident Response Cheat Sheet for Worm Infection – Click Here

Incident Response Cheat Sheet for Windows Intrusion – Click Here

Snffing_Spoofing_Session Hjacking_Netcat

Karma_Wireless_TechDoc

Incident Handling PPT

Checking Windows for Signs of Compromize

Cheat Sheets

Security Incident Log Review Cheat Sheet

netcat_cheat_sheet_v1

GoogleCheatSheet

Intrusion Discovery Cheatsheet for Windows

windows_command_line_sheet_v1

Intrusion Discovery Cheat Sheet for Linux

misc_tools_sheet_v1

Memory Analysis Cheat Sheet.current

SQL Injection Cheat Sheet
Database sercurity Attack Reference (Tools, Cheatsheets) and Protection Guidelines – https://wikihead.wordpress.com/2011/02/26/database-security-attack-reference-and-protective-guidelines/

XSS Cheat sheet

Best Practices

Intrusion Detection Checklist

http://www.cert.org/tech_tips/intruder_detection_checklist.html

Windows NT Intrusion Detection Checklist

http://www.auscert.org.au/render.html?it=1972&cid=1920

UNIX Security Checklist

http://www.auscert.org.au/render.html?it=1935&cid=1920

HTTPS Best Practice Guide (SSL/TLS Deployment)

https://www.ssllabs.com/downloads/SSL_TLS_Deployment_Best_Practices_1.0.pdf

Securing an Internet Name Server

http://www.cert.org/archive/pdf/dns.pdf

Secure Infrastructure Design

http://www.cert.org/archive/pdf/Secure_Infrastructure_Design.pdf

Internet Information Service 5.0 Security Checklist

http://www.microsoft.com/technet/security/chklist/iis5chk.mspx

Internet Information Service 4.0 Security Checklist

http://www.microsoft.com/technet/security/chklist/iischk.mspx

Windows Server 2003 Security Guide

http://www.microsoft.com/technet/security/prodtech/win2003/w2003hg/sgch00.mspx

Windows XP Baseline Security Checklist

http://www.microsoft.com/technet/security/chklist/xpcl.mspx

Windows 2000 Server Baseline Security Checklist

http://www.microsoft.com/technet/security/chklist/w2ksvrcl.mspx

Windows NT 4.0 Server Baseline Security Checklist

http://www.microsoft.com/technet/security/chklist/nt4svrcl.mspx

Windows NT 4.0 Workstation Baseline Security Checklist

http://www.microsoft.com/technet/security/chklist/nt4wscl.mspx

Steps for Recovering from a UNIX or NT System Compromise

http://www.cert.org/tech_tips/win-UNIX-system_compromise.html

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s