Host external connection investigation for enterprise emergency response, with self-made investigation script

0 20
Event descriptionIllegal external connectionIt refers to the connection establis...

Event description

Illegal external connectionIt refers to the connection established with external networks or servers by hosts, networks, or applications without authorization or in violation of security policies.

Situations that may cause external connections include: Unauthorized network connections, malware, viruses, etc.

Possible hazards:

Host external connection investigation for enterprise emergency response, with self-made investigation script

Illegal external connection may cause the loss of sensitive data, leading to the leakage of sensitive data (such as customer information, financial records, company secrets, etc.) to external attackers or third parties. Intellectual property damage: Confidential research and development information or business secrets may be stolen. Malware may communicate with remote control servers through illegal external connections, allowing attackers to remotely control the host. Infected hosts can spread viruses or other malicious software to other systems through the network, causing widespread damage.

How to identify illegal external connection:

Traffic monitoring: Detect abnormal traffic patterns, unauthorized connection requests, or external communications through network monitoring tools.

Log analysis: Analyze the logs of hosts and network devices to find unauthorized external connection records.


Security policy audit: Regularly review network and security policies to ensure that all external connections meet the organization's security requirements.

How to investigate when illegal external connection occurs:


  • Firstly, confirm the illegal external connection host based on the alarm of relevant devices and block the external address on the relevant devices.
  • After blocking, investigate the host

Use the command 'netstat -ano' to view port and external connection information (or use 'netstat -ano | findstr "x.x.x.x"


1722943589_66b2086581f521f6a1034.gif!small?1722943590543

Locate the program through the queried process pid.

Command: wmic process where processid="PID" get ExecutablePath, where pid is the pid queried out, and this command successfully locates the related program location.

1722943615_66b2087f7f2c9fd8a9b18.gif!small?1722943618702

Or use powershell for location

Command: (Get-Process -Id PID).Path

1722943628_66b2088cc86191c4a3a38.gif!small?1722943630171

At this point, the program path of the process has been obtained. Sometimes you may encounter the situation where the file is hidden. You can switch the command line to the directory where the file is located and use the attrib command to cancel the hidden attribute to extract the file.

attrib –H xxxx   xxxx is the filename

1722943641_66b20899913c452f8ec7d.gif!small?1722943643175


When a process is found to be a system process, since the trojan uses injection methods, there is no point in extracting files from the disk. At this time, it is necessary to extract the dump of the process running in memory. Open Task Manager, find the corresponding process name in the process column, right-click -> create dump file.

1722943654_66b208a677952376a1486.gif!small?1722943655257


To determine whether a process and its corresponding file are system files, first, the username of the user who created the process is generally System. Second, after locating the file location, most system processes are located in the Windows System32 directory. Hash this file in VT to determine whether it is a virus disguise.

TCPView:

TCPViewIt is a free tool provided by Microsoft's Sysinternals for real-time viewing of all TCP and UDP port activities in the Windows system. It is similar to the command-line tool netstat, but it has a more intuitive and user-friendly graphical interface.

1722943674_66b208baee81e55bebf4d.gif!small?1722943675738

你可能想看:

Internal and external cultivation | Under the high-confrontation offensive and defensive, internal network security cannot be ignored

Distributed Storage Technology (Part 2): Analysis of the architecture, principles, characteristics, and advantages and disadvantages of wide-column storage and full-text search engines

As announced today, Glupteba is a multi-component botnet targeting Windows computers. Google has taken action to disrupt the operation of Glupteba, and we believe this action will have a significant i

Ensure that the ID can be accessed even if it is guessed or cannot be tampered with; the scenario is common in resource convenience and unauthorized vulnerability scenarios. I have found many vulnerab

In-depth Analysis: Mining Trojan Analysis and Emergency Response Disposal Under a Complete Attack Chain

2021-Digital China Innovation Competition-Huifu Cybersecurity Track-Final-Web-hatenum and source code analysis and payload script analysis

Emergency response of the Windows system from the perspective of permission maintenance

Announcement regarding the addition of 7 units as technical support units for the Ministry of Industry and Information Technology's mobile Internet APP product security vulnerability database

(3) Is the national secret OTP simply replacing the SHA series hash algorithms with the SM3 algorithm, and becoming the national secret version of HOTP and TOTP according to the adopted dynamic factor

Follow the Cybersecurity Medicine Water Brother to fight the target field (emergency response)

最后修改时间:
admin
上一篇 2025年03月29日 14:39
下一篇 2025年03月29日 15:02

评论已关闭