Главная
Study mode:
on
1
Intro
2
Why is this important
3
Showdown
4
F51 vulnerability
5
Who found F51
6
What we found
7
How we did this
8
Gray Noise
9
Forensics
10
Showdown Hunting
11
Pro Tips
12
Ingram Micro
13
DNS
14
DNS IOCs
15
Ransomware
16
trojans
17
CTI League
18
Answering malware
19
Detecting malware
20
Detecting botnets
21
Conclusion
22
QA
Description:
Explore a groundbreaking method for detecting malicious network intrusions in this 48-minute conference talk from BruCON Security Conference. Delve into the limitations of current detection techniques and discover a new approach that provides near-real-time alerting without relying on endpoint client software. Learn how this innovative technology leverages network IOCs beyond existing XDR platforms, offering consistent detection across all OS versions and vendors. Gain insights into detecting supply-chain attacks and partner vulnerabilities. Examine real-world examples from the CTI League's efforts to protect hospitals during the 2020 pandemic. Understand how this method can augment existing EDR solutions, potentially giving organizations extra time to prevent data breaches. Topics covered include the F51 vulnerability, Gray Noise, forensics, DNS IOCs, ransomware, trojans, and techniques for detecting various types of malware and botnets.

Visibility Beyond Perimeters - Detecting C2 at Time of Execution

BruCON Security Conference
Add to list
0:00 / 0:00