Тёмный

Real-Time Threat Hunting - SANS Threat Hunting & Incident Response Summit 2017 

SANS Digital Forensics and Incident Response
Подписаться 72 тыс.
Просмотров 38 тыс.
50% 1

Опубликовано:

 

3 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 9   
@prince10000able
@prince10000able 7 лет назад
Awesome tool and talk Tim 👍 Lots to learn
@Rafsangani
@Rafsangani 6 лет назад
I addition to collecting traces on one side, you can do the search live for anything coming into the network by using tshark and directing the trace to your python scripts to capture what you are looking for and display it instantly. Or send the output to another short file. Use network tapping device to collect/monitor network instead of running wireshark on the server itself.
@hitnahsin
@hitnahsin 4 года назад
i am not sure if we can run Wireshark on big environment.I think this is suitable for a small organization.A big organization have different security zones and its tough for one to actually know where to have a tap.You have taps on IDS/IPS and now with security products like Crowdstrike you are able to get memory forensics and traffic path on a single dashboard....as we progress looks like eventually the programmers will be looking at a console which shows the traffic of their system.The lines are fast disappearing.
@davelundie2866
@davelundie2866 6 лет назад
Great talk
@Anon-tj7qb
@Anon-tj7qb 6 лет назад
Nice to see it used without the buzz
@kareenyirenkyi6720
@kareenyirenkyi6720 4 года назад
Thanks 😘
@anshuman.deshmukh
@anshuman.deshmukh 6 лет назад
It's really awesome for the malware hunters
@sasikumarreddykummetha2299
@sasikumarreddykummetha2299 5 лет назад
hii sir how to learn threat hunting course. please tell me sir any websites are any documents . thanks sasikumar
Далее
SANS Webcast: Effective (Threat) Hunting Techniques
54:01
The Cycle of Cyber Threat Intelligence
1:00:27
Просмотров 115 тыс.
Threat Hunting via Sysmon - SANS Blue Team Summit
51:01