Skip to main content

Questions tagged [intrusion]

Intrusion the act of wrongfully entering upon, seizing, or taking possession of property owned and/or operated by others.

2 votes
0 answers
1k views

How to recover a file with volatility from a linux profile [closed]

I'm trying to recover files from a .mem file with volatility. The mem file is from a Linux machine. I have already loaded the profile and it works fine. I have discovered that the drupalgeddon2 ...
P00's user avatar
  • 43
0 votes
0 answers
120 views

Unexpected drop in UFW noise, should I be worried?

I run a bare-metal on-premises GitLab server (Ubuntu 22.04) for a very small company. While the server isn't currently in production use, it is active and accessible over the public internet. I have ...
rdi_pck's user avatar
0 votes
0 answers
90 views

WIPS and IDS vs NDR

My organisation has a Network Detection and Recovery (NDR) but does not have an WIPS/ WIDS. Because NDR is usually hooked to the core switch, is this enough to detect and mitigate against threats ...
Ethic Or Logics's user avatar
1 vote
1 answer
613 views

How to track which php file executed a malware binary

I have a server that seems to be compromised checking the processes running I see an executable that seems to be a mining malware and the hacker uses it to mine litecoin at the address ...
MOHAMMAD RASIM's user avatar
0 votes
0 answers
530 views

How to determine Snort rules source & destination IP and port

How do you figure out Snort's source & destination IP and port if the question is so vague? For example: Write a snort rule that detects a UK NI number sent from a client's web browser to a web ...
Elaine's user avatar
  • 1
0 votes
1 answer
3k views

Does Microsoft scan the contents of documents uploaded to onedrives personal vault?

Specifically do they, but not "Can they" only because I'm fully aware that they are, and always have been, capable of intruding on any/all personal/sensitive data that isn't encrypted on a ...
Casper's user avatar
  • 1
0 votes
1 answer
122 views

Odd Kerberos Hosts After HD Wipe, and fresh OS re-install

After reformatting my hard disk and rebuilding/re-installing the latest macOS operating system, I found the following IP addresses after running Kerberos.internal.com: kerberos.internal.com has ...
petergibbons's user avatar
0 votes
4 answers
244 views

Mouse moving while unattended, how can I check for intrusions

A few hours ago, I spotted my unattended mouse moving and seeming to click on tabs. I promptly rebooted my system and removed Teamviewer (it's the only remote connection app that I have installed), ...
Olumide's user avatar
  • 101
1 vote
1 answer
519 views

Can an Intrusion Prevention System (e.g. Snort) prevent CSRF and XSS attacks?

I am currently learning about IPS and was wondering about a query that applies to how IPS works. I have knowledge of CSRF and XSS attacks, however I am unsure if Intrusion Prevention Systems can ...
dwayne_d11's user avatar
0 votes
0 answers
157 views

Is every packet of a hostile network flow hostile?

We are building a packet based anomaly detection system and I'm trying to find labeled packets. Such dataset doesn't exist based on my search, but I can find labeled flows. Can we say that every ...
user128576's user avatar
3 votes
0 answers
2k views

Unknown device on my home's local network. What to do about it?

My home router's configuration interface shows a device I don't know, connected via WiFi to my local network. According to the router's history, that device connected to it several days ago. It is ...
Hey's user avatar
  • 1,945
1 vote
0 answers
125 views

Strange Proxy Application Behavior on iOS 13.5.1

Background: My buddy is a freelance journalist working on a story on one of the bigger software companies (a household name, starts with an A). Anyway, he asked me to take a look at his iPad because ...
David's user avatar
  • 11
0 votes
1 answer
379 views

Finding mechanism of unauthorized data access on OneDrive/Windows 10

An ex-girlfriend has demonstrated an ongoing ability to access files stored only on my Windows 10 x64 PCs and Microsoft OneDrive. How can I find or trace the mechanism by which she is doing this? ...
Lysander's user avatar
  • 101
0 votes
0 answers
149 views

Possible to verify the integrity of AIDE itself?

I recently installed the package AIDE (Advanced Intrusion Detection Environment) on my Linux server. This is a web server installed about a year ago. Since no integrity checks have been done before on ...
pmbonneau's user avatar
  • 201
0 votes
3 answers
597 views

How long does it take to have spyware installed on a laptop?

During my commute from an airport located in a country whose government is known for intrusions into the privacy of its citizens and non-citizens, I had my laptop taken from me during a routine ...
Razgriz's user avatar

15 30 50 per page
1
2 3 4 5
10