Главная
Study mode:
on
1
Intro
2
Conversation
3
Krebs... We Need To Talk.
4
Your One Rule.
5
Getting Started
6
Scenario: Recon
7
AWS Keys
8
Alert
9
Context
10
exe
11
Setup
12
Why not make it real?
13
How To Do This
14
Cloned Websites!
15
Trigger
16
History
17
Word Docs!!!
18
Family...
19
Not bad..
20
Enhance
21
Word Web Bugs
22
Tracking!
23
One Step Forward...
24
Important!
25
Kerberoasting
26
We Love Adding This...
27
Honeybadger Update
28
Git It Here
29
Back To Threat Intel
30
Questions?
Description:
Explore a year of cyber deception, attribution, and strategies to make attackers rethink their approaches in this 50-minute conference talk from Derbycon 2019. Delve into various scenarios including reconnaissance, AWS key exploitation, and Kerberoasting. Learn about setting up alerts, creating cloned websites, and implementing web bugs for tracking. Discover techniques for enhancing threat intelligence and gain insights on how to effectively use cyber deception to improve security posture. Engage with practical examples and important considerations for implementing these strategies in real-world environments.

Well What Have We Here - A Year of Cyber Deception, Attribution, and Making Attackers Rethink Their Approach

Add to list