Главная
Study mode:
on
1
Intro
2
Summary
3
Automation is Great...
4
A Tale of Two Systems
5
Shall We Play A Game
6
Cyber Warriors
7
The Adversary - The Most Dangerous Game
8
What You Need to Hunt
9
Human Adversary - Human Defender
10
Collection Systems
11
Alert Management
12
Threat Research
13
Hunting with GRR
14
GRR Overview
15
Preparations & Process
16
What to Hunt
17
How to Hunt
18
The Hunt Begins
19
File Placement
20
Stacked Results
21
Advanced Hunting
Description:
Explore advanced techniques for detecting and countering human adversaries in cybersecurity through this 49-minute conference talk from BSides San Francisco 2015. Delve into the concept of human hunting, comparing automated systems with human-driven approaches. Learn about cyber warriors, adversary tactics, and essential tools for effective threat hunting. Discover the importance of collection systems, alert management, and threat research. Gain insights into hunting methodologies using GRR (Google Rapid Response), including preparation, process definition, and target identification. Follow along as the speaker demonstrates practical hunting techniques, from file placement to advanced hunting strategies, equipping you with valuable skills to enhance your organization's cybersecurity posture.

Human Hunting - Sean Gillespie

Add to list