Тёмный
No video :(

Hunting Threat Actors Using OSINT 

SANS Digital Forensics and Incident Response
Подписаться 72 тыс.
Просмотров 13 тыс.
50% 1

SANS DFIR Summit 2022
Speaker: Abi Waddell
Little attention is given to tracking the perpetrators of cyber-attacks in the world of forensics. DFIR teams can usually attempt to answer the question of what an attacker did, how they did it and when, but rarely who has done something. Fortunately, there are some methods of answering this question using open-source intelligence - methods which have been used successfully to trace the location and identity of threat actors in recent years. Attendees will learn how to get OSINT leading to the identification of a threat actor, based on real life examples, techniques and demos of new free tools including:
• Revealing deleted parts of screenshots and PDF files
• Discerning fake social media accounts
• Finding IP addresses belonging to VPN services likely to be used by cyber criminals
• Results of original research of thousands of leaked accounts, into identifying gender, age and predicted passwords in use, from the chosen usernames and passwords.
• Uncovering identities from pseudonyms
• Using account leaks, search engine analytics, maps, social media, images and more, to hunt threat actors.
This talk will show how focusing more on finding the source of cyber breaches will reduce attacks in the long run and how OSINT can be harnessed legally to discover the identity of cyber criminals. Key takeaways:
Techniques and tools to find the identity of a threat actor based on real life examples, how focusing more on finding the source of cyber breaches will reduce these attacks in the long run and the types of OSINT and how it can be harnessed legally to discover the identity of threat actors.
View upcoming Summits: www.sans.org/u/DuS
Download the presentation slides (SANS account required) at www.sans.org/u...

Опубликовано:

 

28 авг 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 8   
@mattdoesflyfishing
@mattdoesflyfishing Год назад
The information on gender based password selection was super interesting! Can't say I was a fan of the subtle hint at men considering ships, cars and women as "inanimate" objects. In contrast, I would propose that ships, planes and cars much, like women, elicited an emotional response and thus they are named after women. This should be seen as an endearing quality in men. You know, just in case the speakers comments might be taken out of context.
@thethree60five
@thethree60five Год назад
Social engineering is done on a target. Cultural, location, politics, gender, age, education, social media, family, provider, devices, cell and base loc vs statically likely correctness, the more you get, the more likely your testing is correct. As Sun Tzu said, "Know your enemy better than yourself."
@FirstnameLastname-pe5ib
@FirstnameLastname-pe5ib Год назад
Good call.
@Loicmartins
@Loicmartins 4 месяца назад
Thanks for the sharing!
@SD-eu7ht
@SD-eu7ht Год назад
Brilliant
@arsalananwar8265
@arsalananwar8265 Год назад
nice info
@theplastolithicpast8257
@theplastolithicpast8257 Год назад
Alternative title: "How to be an effective stalker"
@rey_nevan
@rey_nevan Год назад
Далее
Keynote: Cobalt Strike Threat Hunting | Chad Tilbury
45:45
Thinking DFIRently From Entry to Specialty
1:37:51
Просмотров 2,8 тыс.
Bilasizmi?
00:12
Просмотров 397 тыс.
The Cycle of Cyber Threat Intelligence
1:00:27
Просмотров 114 тыс.
Using OSINT to find his apartment!
13:28
Просмотров 157 тыс.
Where People Go When They Want to Hack You
34:40
Просмотров 1,6 млн
Cyber Attacks | 60 Minutes Full Episodes
55:59
Просмотров 852 тыс.
Solving a REAL investigation using OSINT
19:03
Просмотров 160 тыс.