# [CVE-2024-32651] changedetection < 0.45.20 - Remote Code Execution (RCE) On the target machine, Changedetection v 0.45.1 is running. A quick search on exploit DB will give the RCE. https://www.exploit-db.com/exploits/52027 Run the exploit code Where IP is the attacker IP and port is the listening port of the attacker. We got the root access.
As security professionals, our
job is to reduce the level of risk to our organization from cyber
security threats. However Incident prevention is never 100% achievable.
So, the best option is to have a proper and efficient security Incident
Management established in the organization. Proactive incident
management helps to prepare the team and limit the damage.
I have written a book on Incident Response and Handling. This book provides a holistic approach for an efficient IT security Incident Management.
Key topics includes,
1) Attack vectors and counter measures.
2) Detailed Security Incident handling framework explained in six phases.
- _Preparation
- _Identification
- _Containment
- _Eradication
- _Recovery
- _Lessons Learned/Follow-up
3) Building an Incident response plan and key elements for an efficient incident response.
4) Building Play books.
5) How to classify and prioritize incidents.
6) Proactive Incident management.
7) How to conduct a table-top exercise.
8) How to write an RCA report /Incident Report.
9) Briefly explained the future of Incident management.
Also includes sample templates on playbook, table-top exercise, Incident Report, Guidebook.