Тёмный
No video :(

Attack Tactics 7: The logs you are looking for 

Black Hills Information Security
Подписаться 60 тыс.
Просмотров 8 тыс.
50% 1

Опубликовано:

 

28 авг 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 11   
@-dash
@-dash 4 года назад
aaah im getting hooked on this stuff. what an awesome field.
@marcus.edmondson
@marcus.edmondson 5 лет назад
Pushing those relevant events to Elastic using winlogbeat is good and if you don't want agents on all of your machines you could send the events to an event collector and then use winlogbeat to ship them off to Elastic. I've been toying around with using kansa modules and powerforensics scripts on a scheduled task and using Filebeat to ship off the output to Elastic.
@maxmusterspace6037
@maxmusterspace6037 5 лет назад
Sysmon is also "yet another agent". From a MSSP point of view where you don't have much leverage on how the customer runs his network, it's hard to get deployed. GPO is better in respect of that. However, many orgs don't even know how to use GPOs. Even the Sysadmins. Which is a new set of problems. ;) It's not easy.
@sinon1361
@sinon1361 4 года назад
amazing content! good job! (Y)
@johnnybravo9564
@johnnybravo9564 Год назад
Hi everyone, I'm a cyber noob and I am trying all of John's labs however, I don't think I am grasping something with how deepblue cli works. The results seem to be based information from another system (presumably Eric's system used for testing). Therefore, i am asking if anyone could advise how to use it to assess my system? Thanks if anyone responds...
@BlackHillsInformationSecurity
The DeepBlueCLI tool reads event logs and has several different options. Basically: Read local security log -or- Read evtx log file Output analysis in powershell terminal. Everything you need (except the log files, though there are samples) is out here: github.com/sans-blue-team/DeepBlueCLI Best Regards, -Jordan Drysdale | BHIS
@JamesSalomon947
@JamesSalomon947 5 лет назад
where can I purchase backdoor and breaches?
@marcus.edmondson
@marcus.edmondson 5 лет назад
Could you use Sysmon event id 10 to see weird processes trying to access lsass to catch it being dumped? This is a sample Splunk query: "EventCode=10 | where (GrantedAccess="0x1010" AND TargetImage LIKE "%lsass.exe")"
@NA-ei7iy
@NA-ei7iy 5 лет назад
GrantedAccess depends on version
@NA-ei7iy
@NA-ei7iy 5 лет назад
ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-9pwMCHlNma4.html
@folafalusi7700
@folafalusi7700 3 года назад
Hi there, is it possible to get the logs from "Attack Tactics 5"?
Далее
Weaponizing Active Directory
58:28
Просмотров 6 тыс.
Oh No! My Doll Fell In The Dirt🤧💩
00:17
Просмотров 10 млн
Only I get to bully my sister 😤
00:27
Просмотров 36 млн
СЕРЕГА ПИРАТ - TEAM SPIRIT
02:37
Просмотров 351 тыс.
Threat Hunting via Sysmon - SANS Blue Team Summit
51:01
Think You're Compromised?  What Do We Do Next?
1:02:27
Просмотров 7 тыс.
Kerberos & Attacks 101
1:00:11
Просмотров 12 тыс.
Is Skynet watching you already?
1:04:00
Просмотров 1 млн
Linux Command Line Dojo with Hal Pomeranz
1:00:00
Просмотров 11 тыс.
Using awk to analyze Bro logs by Mark Krenz
40:19
Просмотров 9 тыс.
Oh No! My Doll Fell In The Dirt🤧💩
00:17
Просмотров 10 млн