Тёмный

SANS DFIR Webcast - Incident Response Event Log Analysis 

SANS Digital Forensics and Incident Response
Подписаться 72 тыс.
Просмотров 82 тыс.
50% 1

Опубликовано:

 

3 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 13   
@lancemarchetti8673
@lancemarchetti8673 2 года назад
With Velociraptor deployments on Debian clouds...DFIR tech has really stepped up the game in a huge way!
@esinyelk
@esinyelk 5 лет назад
Very nice video to go through the basics. Thank you very much.
@ITinProduction
@ITinProduction 3 года назад
Thank you so much for this video, this is so old but still a gold, i always have a confusion about reading any security log files to find the vulnerabilities and trojans or viruses. i wish if you can make another video a lot in detail.
@joshuablanchette878
@joshuablanchette878 7 лет назад
excellent video, the speaker did a great job.
@ruthawele2102
@ruthawele2102 4 года назад
Love this, very informative
@cyberofthinx
@cyberofthinx 2 года назад
Perfect points to make me get it, many thanks!
@alfie0311
@alfie0311 6 лет назад
Well done, thanks
@laptoplifestylegeez
@laptoplifestylegeez 2 года назад
Fantastic training but I can't find the recommended log alerts settings
@Jpsalm91
@Jpsalm91 5 лет назад
When systems become too complicated, thats when the most basic attack becomes effective and vice versa
@am0x01
@am0x01 7 лет назад
was this investigation conducted using the compromised machine or did you use SIFT?
@Eskimoz
@Eskimoz 4 года назад
On like :)
@kenjboyd6233
@kenjboyd6233 5 лет назад
This video is a bit dated. But it wasn't long after this video was produced that Microsoft triggered the control algorithms that they had been working on for many years, and started changing computers two Windows 10 without permission from users. By this point, anyone who doesn't realize that Microsoft is patient zero, as it is called in this video, is either Clueless or scared of Microsoft. No, they will never plant files called malicious. Anything. but any file that starts with the name trusted is a dead giveaway as to being a major component in the first malware driven operating system in history.
@Qantum802
@Qantum802 Год назад
So how do you install Fallout2.exe on a Windows 10 from just the files off the disk because you have a copy but don't know where your usb disk drive is or let alone the disk yet haven't tried finding either because well. Log(s)🧗‍♂️ hahahahaha. I'm serious though, I'm sure you've gotta have the answer I'm looking for.
Далее
#慧慧很努力#家庭搞笑#生活#亲子#记录
00:11
Detecting PsExec Usage
23:16
Просмотров 11 тыс.
CertMike Explains Reviewing Firewall Logs
7:41
Просмотров 2,9 тыс.
Investigating WMI Attacks
1:00:43
Просмотров 26 тыс.
Incident Response: Azure Log Analysis
19:15
Просмотров 65 тыс.
CSS2018LAS8: Incident Handling Process - SANS
49:54
Просмотров 55 тыс.