Главная
Study mode:
on
1
Threat Hunting: Using MITRE ATT&CK against Carbanak malware
2
Threat Hunting - Why?
3
Intelligence - Threat Hunting Model
4
Situational - Threat Hunting Model
5
Hypothesis - Threat Hunting Model
6
MITRE ATT&CK v11.0 Tactics
7
TTP Example
8
Attack working
9
MITRE Initial Access
10
Phishing mitigation
11
MITRE Execution
12
Command & Control Execution Exfiltration
13
Deploy Toolkit (Defense Evasion)
14
Privilege Escalation
15
Lateral Movement
16
Discovery of privileged user
17
Persistence on privileged account
18
Covert access and victim profile
19
Impersonate Victim
Description:
Explore threat hunting techniques using the MITRE ATT&CK Framework in this 51-minute conference talk from BSidesSF 2022. Dive into the practical application of the framework against the 'Carbanak' backdoor, a malware specifically designed for banking applications. Learn about various threat hunting models, including Intelligence, Situational, and Hypothesis-based approaches. Examine MITRE ATT&CK v11.0 Tactics and TTP examples, and understand how attacks work through different stages such as Initial Access, Execution, Command & Control, Exfiltration, and more. Gain insights into mitigating phishing attempts, deploying toolkits for defense evasion, privilege escalation, lateral movement, and discovery of privileged users. Discover techniques for maintaining persistence on privileged accounts, establishing covert access, and impersonating victims. Enhance your cybersecurity skills with this comprehensive exploration of threat hunting strategies and their practical implementation against sophisticated malware. Read more

Threat Hunting - Using MITRE ATT&CK Against Carbanak Malware

Security BSides San Francisco
Add to list
0:00 / 0:00