- Mastering Reverse Engineering
- Reginald Wong
- 185字
- 2021-06-10 19:40:26
The computer network
It is a necessity today that a computer has to be connected to a network so users can access resources from each other. With each computer linked to another whether it is LAN (Local Area Network) or WAN (Wide Area Network), file sharing protocols are also open for attackers to abuse. Malware can attempt to drop copies of itself to file shares. However, the malware depends on the user at the remote end running the malware file from the file share. These kinds of malware are called network worms.
To list down the shared folders in Windows, you can use the net share command, as can be seen in the following screenshot:

As an analyst, we can make recommendations on what to do with these shared folders. We can say that these shares either be removed, if not used. We can also have these folders reviewed for the permissions of who can access it and what type of permissions (like read and write permissions) certain users can have. That way, we are helping secure the network from getting infested by network worms.
- Rootkit和Bootkit:現(xiàn)代惡意軟件逆向分析和下一代威脅
- Mastering Kali Linux for Advanced Penetration Testing
- Spring Security(Third Edition)
- 局域網(wǎng)交換機安全
- 隱私計算
- 從實踐中學(xué)習(xí)Kali Linux滲透測試
- 互聯(lián)網(wǎng)企業(yè)安全高級指南
- Mastering Reverse Engineering
- 網(wǎng)絡(luò)安全態(tài)勢感知
- 網(wǎng)絡(luò)關(guān)鍵設(shè)備安全檢測實施指南
- 網(wǎng)絡(luò)空間安全:拒絕服務(wù)攻擊檢測與防御
- CTF快速上手:PicoCTF真題解析(Web篇)
- Instant OSSEC Host-based Intrusion Detection System
- Metasploit 5.0 for Beginners
- ATT&CK視角下的紅藍(lán)對抗實戰(zhàn)指南