Главная
Study mode:
on
1
Introduction
2
Malware High Level Overview
3
Very Generic Malware Description
4
Finding Malware using DNS logs
5
Malware and DNS
6
Packet Captures
7
Back to DNS - Defensive Techniques
8
DGA (Domain Generation Algorithm)
9
Malware and DGA
10
Identifying Malicious Traffic - Objectives
11
Establish DNS Traffic Baseline
12
Baseline NXDOMAIN responses - cont'd
13
Query for Malicious Domains
14
Analyze DNS Traffic
15
Identifying Anomalous Domain Names
16
Tools
17
dnstop
18
Passive DNS
19
Analyze Network Traffic of Suspect Hosts
20
Notify Community
21
Can we attribute an attack?
22
Be like Good Guy Greg
23
QUESTIONS?
Description:
Explore techniques for identifying malware using DNS logs in this comprehensive conference talk. Delve into the relationship between malware and DNS, examining packet captures and defensive techniques. Learn about Domain Generation Algorithms (DGA) and their role in malware operations. Develop skills to establish DNS traffic baselines, analyze NXDOMAIN responses, and query for malicious domains. Discover methods for identifying anomalous domain names and utilizing tools like dnstop and Passive DNS. Gain insights into analyzing network traffic of suspect hosts, notifying the community, and considering attack attribution. Enhance your cybersecurity knowledge with practical approaches to detect and mitigate malware threats through DNS analysis.

Another Log to Analyze - Utilizing DNS to Identify Malware

Add to list