Главная
Study mode:
on
1
Introduction
2
Agenda
3
What are threat actors
4
Threat actor I tracked
5
Why track for actors
6
The scenario
7
Safe environment setup
8
Wireshark
9
Metadata
10
The hint
11
Finding more samples
12
Resolving domains
13
Map out
14
Pivot
15
Analyze
16
Jessica Koran
17
Prince Ali
18
Tracking methods
19
Tips
20
Summary
21
Outro
Description:
Explore the fundamentals of threat actor tracking in this 15-minute conference talk from Security BSides London. Dive into the world of cybersecurity as Keith Short shares his beginner's experience in identifying and following digital threats. Learn about the importance of tracking threat actors, setting up a safe environment, and utilizing tools like Wireshark for analysis. Discover techniques for extracting metadata, resolving domains, and mapping connections. Follow along as Short presents a real-world scenario, introducing threat actors Jessica Koran and Prince Ali, and demonstrates practical tracking methods. Gain valuable tips and insights to enhance your own threat intelligence capabilities in this concise yet informative presentation.

Connecting the Dots - A Beginner's Experience of Threat Actor Tracking

Security BSides London
Add to list
0:00 / 0:00