Главная
Study mode:
on
1
Intro
2
Abnormal Behavior Detection
3
Defense
4
Understanding Attack Patterns
5
Initial Intrusion
6
Exploitation Methods
7
HTML Attack
8
PowerShell Injection
9
Invoke obfuscation
10
Honey tokens
11
Responder
12
SCT Files
13
Persistence hooks
14
Service creations
15
Application whitelisting
16
Mitigations
17
Purple Time
Description:
Explore abnormal behavior detection in large environments through this 50-minute conference talk from GrrCon 2016. Delve into defense strategies, attack patterns, and initial intrusion techniques. Learn about exploitation methods, including HTML attacks and PowerShell injection. Discover the use of invoke obfuscation, honey tokens, and Responder. Examine SCT files, persistence hooks, and service creations. Understand the importance of application whitelisting and various mitigation techniques. Gain insights into the concept of "Purple Time" and its relevance in cybersecurity.

Abnormal Behavior Detection in Large Environments

Add to list
0:00 / 0:00