SANS DFIR Webcast - Incident Response Event Log Analysis

  Рет қаралды 83,780

SANS Digital Forensics and Incident Response

SANS Digital Forensics and Incident Response

Күн бұрын

Пікірлер: 13
@lancemarchetti8673
@lancemarchetti8673 2 жыл бұрын
With Velociraptor deployments on Debian clouds...DFIR tech has really stepped up the game in a huge way!
@ITinProduction
@ITinProduction 3 жыл бұрын
Thank you so much for this video, this is so old but still a gold, i always have a confusion about reading any security log files to find the vulnerabilities and trojans or viruses. i wish if you can make another video a lot in detail.
@esinyelk
@esinyelk 5 жыл бұрын
Very nice video to go through the basics. Thank you very much.
@joshuablanchette878
@joshuablanchette878 7 жыл бұрын
excellent video, the speaker did a great job.
@ruthawele2102
@ruthawele2102 4 жыл бұрын
Love this, very informative
@cyberofthinx
@cyberofthinx 2 жыл бұрын
Perfect points to make me get it, many thanks!
@laptoplifestylegeez
@laptoplifestylegeez 2 жыл бұрын
Fantastic training but I can't find the recommended log alerts settings
@alfie0311
@alfie0311 6 жыл бұрын
Well done, thanks
@Jpsalm91
@Jpsalm91 5 жыл бұрын
When systems become too complicated, thats when the most basic attack becomes effective and vice versa
@kepenge
@kepenge 8 жыл бұрын
was this investigation conducted using the compromised machine or did you use SIFT?
@kenjboyd6233
@kenjboyd6233 6 жыл бұрын
This video is a bit dated. But it wasn't long after this video was produced that Microsoft triggered the control algorithms that they had been working on for many years, and started changing computers two Windows 10 without permission from users. By this point, anyone who doesn't realize that Microsoft is patient zero, as it is called in this video, is either Clueless or scared of Microsoft. No, they will never plant files called malicious. Anything. but any file that starts with the name trusted is a dead giveaway as to being a major component in the first malware driven operating system in history.
@Eskimoz
@Eskimoz 5 жыл бұрын
On like :)
@Qantum802
@Qantum802 2 жыл бұрын
So how do you install Fallout2.exe on a Windows 10 from just the files off the disk because you have a copy but don't know where your usb disk drive is or let alone the disk yet haven't tried finding either because well. Log(s)🧗‍♂️ hahahahaha. I'm serious though, I'm sure you've gotta have the answer I'm looking for.
SANS DFIR Webcast - Memory Forensics for Incident Response
1:08:10
SANS Digital Forensics and Incident Response
Рет қаралды 54 М.
What Event Logs?  Part 1:  Attacker Tricks to Remove Event Logs
1:06:21
SANS Digital Forensics and Incident Response
Рет қаралды 27 М.
VIP ACCESS
00:47
Natan por Aí
Рет қаралды 30 МЛН
When you have a very capricious child 😂😘👍
00:16
Like Asiya
Рет қаралды 18 МЛН
All Things Entry Level Digital Forensics and Incident Response Engineer DFIR
19:16
Gerald Auger, PhD - Simply Cyber
Рет қаралды 29 М.
Investigating WMI Attacks
1:00:43
SANS Digital Forensics and Incident Response
Рет қаралды 27 М.
Detecting Command and Control Frameworks via Sysmon and Windows Event Logging
28:07
Event Log Forensics with Log Parser
19:58
13Cubed
Рет қаралды 36 М.
Keynote: Cobalt Strike Threat Hunting | Chad Tilbury
45:45
SANS Digital Forensics and Incident Response
Рет қаралды 32 М.
SOC 101: Real-time Incident Response Walkthrough
12:30
Exabeam
Рет қаралды 212 М.
DFIR 101: Digital Forensics Essentials | Kathryn Hedley
1:16:05
SANS Digital Forensics and Incident Response
Рет қаралды 37 М.
Email Header Analysis and Forensic Investigation
22:59
13Cubed
Рет қаралды 155 М.
Practical Malware Analysis Essentials for Incident Responders
50:49
RSA Conference
Рет қаралды 153 М.
Incident Response in the Cloud (AWS) - SANS Digital Forensics & Incident Response Summit 2017
28:02
SANS Digital Forensics and Incident Response
Рет қаралды 20 М.
VIP ACCESS
00:47
Natan por Aí
Рет қаралды 30 МЛН