Главная
Study mode:
on
1
Intro
2
DISCLAIMERS
3
THE ORIGINS
4
USE CASES
5
WALKTHROUGH / DEMONSTRATION
6
ORGANIZATION PROFILE
7
GENERAL FLOW Step 1: Identify domain controllers
8
DOMAIN CONTROLLERS QUERY
9
DOMAIN CONTROLLERS FINDINGS
10
ENDPOINT DISCOVERY QUERY
11
ENDPOINT DISCOVERY FINDINGS
12
ENDPOINT LOGGING QUERY
13
ENDPOINT LOGGING FINDINGS
14
EGRESS TRAFFIC QUERY
15
EGRESS TRAFFIC FINDINGS
16
INTERNAL VISIBILITY QUERY
17
INTERNAL VISIBILITY FINDINGS
18
ENDPOINT DETECTION COVERAGE QUERY
19
ENDPOINT DETECTION COVERAGE FINDINGS
20
CURRENT MAP
21
ADDITIONAL SUB THEORIES
22
FUTURE OF THE THEORY
Description:
Explore the concept of network gravity in enterprise networks through a conference talk from BSides Tampa 2020. Delve into the origins, use cases, and a detailed walkthrough of the theory, including steps to identify domain controllers, endpoint discovery, logging, egress traffic analysis, and internal visibility. Gain insights into endpoint detection coverage and learn about additional sub-theories and the future of network gravity. Enhance your understanding of enterprise network security and analysis techniques in this 44-minute presentation by Casey Martin.

Network Gravity - Exploring an Enterprise Network

Add to list