Hunting Threat Actors Using OSINT

  Рет қаралды 12,790

SANS Digital Forensics and Incident Response

SANS Digital Forensics and Incident Response

Жыл бұрын

SANS DFIR Summit 2022
Speaker: Abi Waddell
Little attention is given to tracking the perpetrators of cyber-attacks in the world of forensics. DFIR teams can usually attempt to answer the question of what an attacker did, how they did it and when, but rarely who has done something. Fortunately, there are some methods of answering this question using open-source intelligence - methods which have been used successfully to trace the location and identity of threat actors in recent years. Attendees will learn how to get OSINT leading to the identification of a threat actor, based on real life examples, techniques and demos of new free tools including:
• Revealing deleted parts of screenshots and PDF files
• Discerning fake social media accounts
• Finding IP addresses belonging to VPN services likely to be used by cyber criminals
• Results of original research of thousands of leaked accounts, into identifying gender, age and predicted passwords in use, from the chosen usernames and passwords.
• Uncovering identities from pseudonyms
• Using account leaks, search engine analytics, maps, social media, images and more, to hunt threat actors.
This talk will show how focusing more on finding the source of cyber breaches will reduce attacks in the long run and how OSINT can be harnessed legally to discover the identity of cyber criminals. Key takeaways:
Techniques and tools to find the identity of a threat actor based on real life examples, how focusing more on finding the source of cyber breaches will reduce these attacks in the long run and the types of OSINT and how it can be harnessed legally to discover the identity of threat actors.
View upcoming Summits: www.sans.org/u/DuS
Download the presentation slides (SANS account required) at www.sans.org/u/1iaE

Пікірлер: 8
@Loicmartins
@Loicmartins Ай бұрын
Thanks for the sharing!
@mattdoesflyfishing
@mattdoesflyfishing Жыл бұрын
The information on gender based password selection was super interesting! Can't say I was a fan of the subtle hint at men considering ships, cars and women as "inanimate" objects. In contrast, I would propose that ships, planes and cars much, like women, elicited an emotional response and thus they are named after women. This should be seen as an endearing quality in men. You know, just in case the speakers comments might be taken out of context.
@thethree60five
@thethree60five Жыл бұрын
Social engineering is done on a target. Cultural, location, politics, gender, age, education, social media, family, provider, devices, cell and base loc vs statically likely correctness, the more you get, the more likely your testing is correct. As Sun Tzu said, "Know your enemy better than yourself."
@FirstnameLastname-pe5ib
@FirstnameLastname-pe5ib Жыл бұрын
Good call.
@SD-eu7ht
@SD-eu7ht Жыл бұрын
Brilliant
@arsalananwar8265
@arsalananwar8265 Жыл бұрын
nice info
@theplastolithicpast8257
@theplastolithicpast8257 Жыл бұрын
Alternative title: "How to be an effective stalker"
@rey_nevan
@rey_nevan Жыл бұрын
My “Aha!” Moment - Methods, Tips, & Lessons Learned in Threat Hunting - SANS THIR Summit 2019
33:41
SANS Digital Forensics and Incident Response
Рет қаралды 13 М.
A Practical Case of Threat Intelligence - From IoC to Unraveling an Attacker Infrastructure
23:49
SANS Digital Forensics and Incident Response
Рет қаралды 5 М.
The day of the sea 🌊 🤣❤️ #demariki
00:22
Demariki
Рет қаралды 52 МЛН
В ДЕТСТВЕ СТРОИШЬ ДОМ ПОД СТОЛОМ
00:17
SIDELNIKOVVV
Рет қаралды 4,1 МЛН
Неприятная Встреча На Мосту - Полярная звезда #shorts
00:59
Полярная звезда - Kuzey Yıldızı
Рет қаралды 2,9 МЛН
Solving a REAL investigation using OSINT
19:03
Gary Ruddell
Рет қаралды 139 М.
SANS Webcast: Effective (Threat) Hunting Techniques
54:01
SANS EMEA
Рет қаралды 28 М.
Using OSINT to find his apartment!
13:28
Gary Ruddell
Рет қаралды 150 М.
24 Techniques to Gather Threat Intel and Track Actors
52:50
Black Hat
Рет қаралды 3,8 М.
Where People Go When They Want to Hack You
34:40
CyberNews
Рет қаралды 1,1 МЛН
Keynote: Cobalt Strike Threat Hunting | Chad Tilbury
45:45
SANS Digital Forensics and Incident Response
Рет қаралды 30 М.
My life as Cyber Forensic Investigator and what Certifications you should
12:37
UnixGuy | Cyber Security
Рет қаралды 68 М.
Doing a Live OSINT Investigation on an Instagram Influencer
12:22
Cody Bernardy
Рет қаралды 59 М.
Real-Time Threat Hunting - SANS Threat Hunting & Incident Response Summit 2017
28:10
SANS Digital Forensics and Incident Response
Рет қаралды 37 М.
После ввода кода - протирайте панель
0:18
Телефон в воде 🤯
0:28
FATA MORGANA
Рет қаралды 774 М.
WWDC 2024 Recap: Is Apple Intelligence Legit?
18:23
Marques Brownlee
Рет қаралды 6 МЛН
Разряженный iPhone может больше Android
0:34
#miniphone
0:16
Miniphone
Рет қаралды 3,2 МЛН