Главная
Study mode:
on
1
Introduction
2
What is a graph
3
Examples of graphs
4
Financial security
5
Graphs
6
Bloodhound
7
CloudMapper
8
Logs
9
Nodes
10
Identity
11
Logbased Detection
12
Word and PowerShell
13
Fundamentals
14
Python
15
Python Analyzer
16
Logbased investigations
17
Finding the parent process
18
Jupiter notebooks
19
Lenses
20
Graph
21
Engagements
22
Pivoting
23
Pivoting behavior
24
Visualization and investigation
25
Grapl plugin
26
Process tree analysis
27
Recursive queries
28
Setting up Grapl
Description:
Explore graph-based detection and response techniques using Grapl in this 46-minute conference talk from BSidesSF 2020. Learn how to leverage graphs and Python to build powerful, behavior-oriented attack signatures and investigate suspicious activities in your environment. Discover the fundamentals of graph analytics, including examples from financial security and tools like Bloodhound and CloudMapper. Dive into log-based detection, identity management, and Python analyzers. Gain insights on conducting log-based investigations, finding parent processes, and utilizing Jupiter notebooks. Explore advanced topics such as lenses, graph engagements, pivoting behaviors, and visualization techniques. Understand process tree analysis, recursive queries, and how to set up Grapl for enhanced security detection and response capabilities.

Graph Based Detection and Response with Grapl

Security BSides San Francisco
Add to list
0:00 / 0:00