Главная
Study mode:
on
1
Intro
2
Key Range Terms and Network
3
Regent's Range In a Nutshell
4
Range Network Layout and Components
5
Scenarios
6
Regent's Use Cases for Sec Onion
7
BT3 Client Side
8
Snort Picks up the Trojan Behavior
9
What FOSS tools are out there?
10
Pull out the Packet
11
Swanky!
12
The Investigation
13
Common Tasks
14
Taking Action on the Finding
15
On the Wire ... (slides follow)
16
Adding Data Sources - A Journey!
17
Two Different views of application usage
Description:
Explore the intricacies of cybersecurity team dynamics in this conference talk from Security Onion Conference 2018. Delve into the roles of Blue, Red, Purple, and White teams as Don Murdoch, known as @BlueTeamHB, breaks down key range terms and network concepts. Gain insights into the Regent's Range setup, including network layout and components, and discover various scenarios and use cases for Security Onion. Learn about BT3 client-side operations and how Snort detects Trojan behavior. Examine available open-source tools and techniques for packet analysis. Follow along as Murdoch guides you through a cybersecurity investigation, covering common tasks and actionable findings. Explore on-the-wire scenarios and the process of adding data sources. Compare different views of application usage to enhance your understanding of comprehensive security monitoring and response strategies.

Blue, Red, Purple, White - Which Team Are You On?

Security Onion
Add to list
0:00 / 0:00