Тёмный
Raiders of the Lost ARP
Raiders of the Lost ARP
Raiders of the Lost ARP
Подписаться
There is a big difference between seeing the big cyber events and trends happening around us, and taking control of the situation to reduce their impact. This channel will aim to make sense of those events and show how we can reduce the noise to focus on our own threat picture and improve defenses.
Комментарии
@razzawazza
@razzawazza 5 месяцев назад
Thanks for this mate
@kcinytrewq
@kcinytrewq 10 месяцев назад
Very concise well made video. Thank you.
@JD-rb1hv
@JD-rb1hv Год назад
Hey Mike, Thank you for wonderful video. I am comparing 2 APT group layers. Suppose, I want to select few techniques in an existing layer manually , how can i do that? I could not see any options to select additional techniques. Thanks in advance.
@MikeMcPhee101
@MikeMcPhee101 11 месяцев назад
Assuming you have already selected some techniques via a Group search or something, you can click on additional techniques to add them in. The trick is to ensure you actually score or color those before you deselect them or move away from that tab.
@nicktamm3
@nicktamm3 Год назад
Amazing resource explanation! Thank you! BTW - love the shirt
@heinrichmartinez445
@heinrichmartinez445 Год назад
wow!
@JamnD300
@JamnD300 Год назад
Awesome video, extremely helpful. I cant seem to import adversaries. What is the process to do so?
@MikeMcPhee101
@MikeMcPhee101 Год назад
Hello Ben! the EMU plugin is the key to getting adversaries imported. you would need to activate this in the Configuration for plugins and then reboot the Caldera instance. Depending on how you deployed it, you may find it is a little flakey - I have my best luck with it running on an Linux (Ubuntu) VM, rather than as a container on local host.
@asdfasddfs5484
@asdfasddfs5484 Год назад
Thank you
@redbeardjunior
@redbeardjunior Год назад
I like your video but for me the text on the website is hard to read !
@tunisianpentester5441
@tunisianpentester5441 Год назад
thanks for the great video, very informative
@MikeMcPhee101
@MikeMcPhee101 Год назад
Thank you! Very glad you liked it and found something useful in it!
@tmlondon3070
@tmlondon3070 Год назад
Great demo👌👍💯
@AniketAmdekar
@AniketAmdekar 2 года назад
Really cool video! Can you share some examples of some successful attacks and how each layer of MITRE was used in it?
@MikeMcPhee101
@MikeMcPhee101 2 года назад
Hello Aniket! There are a lot of great threat intel blogs out there by Cisco and others that actually do exactly that. A great one to follow can be seen here: blog.talosintelligence.com/2021/08/vice-society-ransomware-printnightmare.html