BHIS | Looking for Needles in Needlestacks w/ Threat Hunting Toolkit | Derek Banks & Ethan Robish

  Рет қаралды 4,594

Black Hills Information Security

Black Hills Information Security

Күн бұрын

Пікірлер
@securityq5809
@securityq5809 3 жыл бұрын
Awesome video as always! Bless Bless the entire team!
@JoshMillikan
@JoshMillikan 3 жыл бұрын
39:50 if you want to skip the random talking at the beginning.
@BlackHillsInformationSecurity
@BlackHillsInformationSecurity 3 жыл бұрын
Thanks! Chapter Points have been updated in description!
@HishanShouketh
@HishanShouketh 3 жыл бұрын
Hi team question, what woul be the best tool to find process thats is responsible for the network connectivity, assuming we dont have Symon installed at the endpoint. I didnt have much luck with netstat in the past. Thanx in advance
@faanross
@faanross 4 ай бұрын
Hey, if the connection is still live there are many tools, I like using ProcessHacker for that, since I can correlate Ip to the process, and then obvs with PH I can get SO MUCH - parent-child, cert, modules, memory info, strings etc. Just keep in mind that if it's a beacon (ie intermittent connection), it will only show the moment there is a connection, when it disconnects it disappears again. A cool thing about using a GUI/live-update vs netstat in this case is with netstat you'll need to run the command over and over until you happen to run it at the exact moment the connection is live. With Process Hacker you can see a green bar - connections made - and then it turns into a red bar - connection killed. So it really pops, just wait the moment until it's live, you'll see the PID and then you can have at it.
Tales from the Network Threat Hunting Trenches & AI Hunter Demo
1:30:44
Black Hills Information Security
Рет қаралды 17 М.
A|C - Beacon Analysis - The Key to Cyber Threat Hunting | Chris Brenton
59:45
Active Countermeasures
Рет қаралды 1,6 М.
The evil clown plays a prank on the angel
00:39
超人夫妇
Рет қаралды 53 МЛН
Tuna 🍣 ​⁠@patrickzeinali ​⁠@ChefRush
00:48
albert_cancook
Рет қаралды 148 МЛН
Cloud Security Risks: Exploring the latest Threat Landscape Report
11:33
Detecting Command and Control Frameworks via Sysmon and Windows Event Logging
28:07
Hunt for Hackers with Velociraptor
13:51
John Hammond
Рет қаралды 99 М.
Introduction to Zeek Log Analysis w/ Troy Wojewoda
59:50
Black Hills Information Security
Рет қаралды 1 М.
My “Aha!” Moment - Methods, Tips, & Lessons Learned in Threat Hunting - SANS THIR Summit 2019
33:41
SANS Digital Forensics and Incident Response
Рет қаралды 15 М.
2024-02-23- Cyber Threat Hunting Level 1 - Chris Brenton #infosec #training #class
4:46:51
Your First Three Linux IR Commands If You're Compromised! | John Strand | BHIS Nuggets
6:08
Black Hills Information Security
Рет қаралды 10 М.
Uncovering and Visualizing Malicious Infrastructure - SANS Threat Hunting Summit 2018
28:36
SANS Digital Forensics and Incident Response
Рет қаралды 2,5 М.
Threat Hunting via Sysmon - SANS Blue Team Summit
51:01
SANS Institute
Рет қаралды 63 М.