[MATT Wk 13] Malicious Documents Analysis
Malicious Documents Malicious documents are a common vector for malware delivery. Can be in forms of Word, Excel, PDF, etc. that contain malicious macros or scripts Often used in targeted at...
Malicious Documents Malicious documents are a common vector for malware delivery. Can be in forms of Word, Excel, PDF, etc. that contain malicious macros or scripts Often used in targeted at...
Malicious Websites Malware can be delivered through the browser or operate within the browser itself. Leverage on HTML, JavaScript, and (nowadays) less commonly, VBScript, Flash and Java. Pr...
Conditionals Conditionals Instructions that perform comparisons; based on the result, the program will execute different instructions. Most common conditional instructions: test an...
Security Profile Overview Content-ID Threat prevention engine and policies to inspect and control data flowing through the firewall Typically scans for: Software vulnerability expl...
Firewall Configuration Concepts Commit Allows users to review and validate configurations before applying them to the firewall. This is a best practice to avoid misconfigurations. Ingress F...
App-ID Overview App-ID Identifies applications in traffic and observed by firewall to understand their behaviour and set policies to control them. App-ID Process App-ID Signature Matc...
Practical - Firewall Layer 3 Configuration This write-up is simply a summary of the practical exercises done in Wk3 without the fluff. Scenario Objectives: Configure Ethernet Interfaces wi...
Security Policy Concepts and Operations Security Policy Rules that control network traffic by allowing or denying sessions based on traffic attributes (e.g.: Source and Destination Zone) O...
Network Segmentation Network Segmentation Dividing a network into multiple areas (zones), each protected by a firewall with specific security policies. Purpose: Prevents lateral mo...
Secure Network Designs Weak Network Design/Architecture Single point of failure: One device failing can bring down the entire network Complex dependencies: Difficult to troubleshoot and main...