Главная
Study mode:
on
1
Introduction
2
Why this talk
3
Agenda
4
Compression
5
Filtering
6
What is Netflow
7
Typical Netflow fields
8
Similar products
9
Pcaps vs Netflow
10
What you need
11
Flowing the path
12
Generating the CSV
13
Getting silk installed
14
Analysis methods
15
Free trial
16
Other tools
17
SoftElk
18
Thread Hunt
19
Jupiter
20
Jupiter demo
21
Two things that come to mind
22
Standard deviation
23
VPN
Description:
Explore the often-overlooked potential of Netflow data in network forensics through this 42-minute conference talk from Hack in Paris. Dive into the world of NetflOSINT as Joe GRAY, an experienced security threat hunting and intelligence engineer, demonstrates how to operationalize this valuable data source. Learn about extracting Netflow data from PCAPs, enabling more efficient statistical and in-depth analysis. Discover tools and techniques for leveraging Netflow information in cybersecurity investigations, including compression, filtering, and analysis methods. Gain insights into the advantages of Netflow over traditional packet captures and explore related products like IPFIX. Follow along as GRAY showcases practical demonstrations using tools such as SiLK, SoftElk, and Jupiter, and understand how to apply concepts like standard deviation in threat hunting scenarios. Whether you're a seasoned cybersecurity professional or new to network forensics, this talk offers valuable knowledge to enhance your investigative capabilities and broaden your understanding of often-underutilized data sources in the field. Read more

NetflOSINT- Taking an Often-Overlooked Data Source and Operationalizing It - Joe Gray - Hack in Paris

Hack in Paris
Add to list