Attack Tactics 7: The logs you are looking for

  Рет қаралды 8,343

Black Hills Information Security

Black Hills Information Security

Күн бұрын

Пікірлер: 11
@-dash
@-dash 4 жыл бұрын
aaah im getting hooked on this stuff. what an awesome field.
@marcus.edmondson
@marcus.edmondson 5 жыл бұрын
Pushing those relevant events to Elastic using winlogbeat is good and if you don't want agents on all of your machines you could send the events to an event collector and then use winlogbeat to ship them off to Elastic. I've been toying around with using kansa modules and powerforensics scripts on a scheduled task and using Filebeat to ship off the output to Elastic.
@JamesSalomon947
@JamesSalomon947 5 жыл бұрын
where can I purchase backdoor and breaches?
@maxmusterspace6037
@maxmusterspace6037 5 жыл бұрын
Sysmon is also "yet another agent". From a MSSP point of view where you don't have much leverage on how the customer runs his network, it's hard to get deployed. GPO is better in respect of that. However, many orgs don't even know how to use GPOs. Even the Sysadmins. Which is a new set of problems. ;) It's not easy.
@folafalusi7700
@folafalusi7700 4 жыл бұрын
Hi there, is it possible to get the logs from "Attack Tactics 5"?
@sinon1361
@sinon1361 5 жыл бұрын
amazing content! good job! (Y)
@johnnybravo9564
@johnnybravo9564 Жыл бұрын
Hi everyone, I'm a cyber noob and I am trying all of John's labs however, I don't think I am grasping something with how deepblue cli works. The results seem to be based information from another system (presumably Eric's system used for testing). Therefore, i am asking if anyone could advise how to use it to assess my system? Thanks if anyone responds...
@BlackHillsInformationSecurity
@BlackHillsInformationSecurity Жыл бұрын
The DeepBlueCLI tool reads event logs and has several different options. Basically: Read local security log -or- Read evtx log file Output analysis in powershell terminal. Everything you need (except the log files, though there are samples) is out here: github.com/sans-blue-team/DeepBlueCLI Best Regards, -Jordan Drysdale | BHIS
@marcus.edmondson
@marcus.edmondson 5 жыл бұрын
Could you use Sysmon event id 10 to see weird processes trying to access lsass to catch it being dumped? This is a sample Splunk query: "EventCode=10 | where (GrantedAccess="0x1010" AND TargetImage LIKE "%lsass.exe")"
@NA-ei7iy
@NA-ei7iy 5 жыл бұрын
GrantedAccess depends on version
@NA-ei7iy
@NA-ei7iy 5 жыл бұрын
kzbin.info/www/bejne/b6HafnZ-obOgl5Y
Think You're Compromised?  What Do We Do Next?
1:02:27
Black Hills Information Security
Рет қаралды 7 М.
Weaponizing Active Directory
58:28
Black Hills Information Security
Рет қаралды 6 М.
VIP ACCESS
00:47
Natan por Aí
Рет қаралды 30 МЛН
She made herself an ear of corn from his marmalade candies🌽🌽🌽
00:38
Valja & Maxim Family
Рет қаралды 18 МЛН
The evil clown plays a prank on the angel
00:39
超人夫妇
Рет қаралды 53 МЛН
A Blue Team's Perspective on Red Team Hack Tools
1:00:53
Black Hills Information Security
Рет қаралды 9 М.
Tales from the Network Threat Hunting Trenches & AI Hunter Demo
1:30:44
Black Hills Information Security
Рет қаралды 17 М.
Threat Hunting via Sysmon - SANS Blue Team Summit
51:01
SANS Institute
Рет қаралды 63 М.
Attack Tactics: Part 1
55:25
Black Hills Information Security
Рет қаралды 16 М.
RITA - Finding Bad Things on Your Network Using Free and Open Source Tools
1:08:13
Black Hills Information Security
Рет қаралды 28 М.
Kerberos & Attacks 101
1:00:11
Black Hills Information Security
Рет қаралды 12 М.
BHIS | Intro to Windows Event Collecting | Nick & Noah | 1 Hour
57:22
Black Hills Information Security
Рет қаралды 6 М.
Endpoint Security Got You Down? No PowerShell? No Problem.
56:29
Black Hills Information Security
Рет қаралды 4,7 М.
What Event Logs?  Part 1:  Attacker Tricks to Remove Event Logs
1:06:21
SANS Digital Forensics and Incident Response
Рет қаралды 27 М.
The SOC Age  Or, A Young SOC Analyst's Illustrated Primer | John Strand | 1 Hour
1:17:58
Black Hills Information Security
Рет қаралды 24 М.
VIP ACCESS
00:47
Natan por Aí
Рет қаралды 30 МЛН