Threat Hunting with Network Flow - SANS Threat Hunting Summit 2017

  Рет қаралды 19,745

SANS Digital Forensics and Incident Response

SANS Digital Forensics and Incident Response

Күн бұрын

Пікірлер: 8
@shanecherniss
@shanecherniss 4 жыл бұрын
Nice presentation on beginning to understand the concept of Netflow. It failed to deliver on the content in the description: The focus of this presentation will be on how to incorporate network flow analysis into your threat hunting toolkit. We will cover topics such as anomaly discovery versus signature matching, IP expansion, longitudinal analysis of threat actors, how network flow relates to the Cyber Kill Chain, and where network flow analysis should sit in the threat hunting cycle. We will look at real world examples of the effects of these techniques in discovering malicious actors on networks.
@suknow2008
@suknow2008 4 жыл бұрын
This is really well done in terms of explaining flow for hunting
@Ben_79
@Ben_79 3 жыл бұрын
I hope I can watch/listen to it later but I'll have to deal with the echoing ring. This is not against the presenter but the audio could have been better.
@AlainaD2003
@AlainaD2003 5 жыл бұрын
Great presentation.
@osmaster3327
@osmaster3327 4 жыл бұрын
Great.Thank you.
@ankury4762
@ankury4762 2 жыл бұрын
Cool
@adamwarowny4836
@adamwarowny4836 4 жыл бұрын
Same shit as everywhere. Same diagams, same nothing-giving examples.
ShimCache and AmCache enterprise-wide hunting - SANS Threat Hunting Summit 2017
27:53
SANS Digital Forensics and Incident Response
Рет қаралды 9 М.
My “Aha!” Moment - Methods, Tips, & Lessons Learned in Threat Hunting - SANS THIR Summit 2019
33:41
SANS Digital Forensics and Incident Response
Рет қаралды 15 М.
Гениальное изобретение из обычного стаканчика!
00:31
Лютая физика | Олимпиадная физика
Рет қаралды 4,8 МЛН
To Brawl AND BEYOND!
00:51
Brawl Stars
Рет қаралды 17 МЛН
Tales from the Network Threat Hunting Trenches & AI Hunter Demo
1:30:44
Black Hills Information Security
Рет қаралды 18 М.
Hunting Threat Actors Using OSINT
39:39
SANS Digital Forensics and Incident Response
Рет қаралды 14 М.
The Cycle of Cyber Threat Intelligence
1:00:27
SANS Digital Forensics and Incident Response
Рет қаралды 120 М.
Threat Hunting Using Live Box Forensics - SANS Threat Hunting Summit 2018
27:47
SANS Digital Forensics and Incident Response
Рет қаралды 4,9 М.
Incident Response in the Cloud (AWS) - SANS Digital Forensics & Incident Response Summit 2017
28:02
SANS Digital Forensics and Incident Response
Рет қаралды 20 М.
TCP Fundamentals Part 1 // TCP/IP Explained with Wireshark
1:17:24
Chris Greer
Рет қаралды 458 М.
A|C - Beacon Analysis - The Key to Cyber Threat Hunting | Chris Brenton
59:45
Active Countermeasures
Рет қаралды 1,7 М.
T209 How to Hunt for Lateral Movement on Your Network Ryan Nolette
45:37
Adrian Crenshaw
Рет қаралды 3,8 М.
Leveraging OSINT to Track Cyber Threat Actors
32:21
SANS Cyber Defense
Рет қаралды 2,9 М.
Гениальное изобретение из обычного стаканчика!
00:31
Лютая физика | Олимпиадная физика
Рет қаралды 4,8 МЛН