Главная
Study mode:
on
1
Intro
2
Presentation Outline
3
Background
4
What is a signature
5
What are the other opportunities
6
What are good signatures
7
How we think about detection
8
What is it
9
How to find it
10
Assembling sample sets
11
Testing existing protections
12
Generating data
13
Writing rules
14
Intelligence Gathering
15
Example
16
Group Samples
17
Detection
18
Mutual Support
19
enumerate
20
test
21
register32 overview
22
register32 detection
23
FTP WebDAV
24
Argument reordering
25
Arguments
26
Changing Arguments
27
Double Quotes
28
HTTP
29
SCT Detection
30
Class ID
31
Script Tags
32
Script Language
33
Whitespace
34
Attack Lifecycle
35
Summary
36
Know your tools
37
New application techniques
Description:
Explore the intricacies of creating resilient, high-fidelity threat detections in this 57-minute conference talk from BruCON Security Conference. Delve into the challenges of developing signatures that withstand evasion attempts by dedicated attackers and researchers. Learn from FireEye's Advanced Practices Team as they share insights on their processes and approaches to detection development, including practical examples derived from real-world attacks. Discover the importance of proper tools, visibility, and a methodical, iterative approach in crafting effective detections. Gain valuable knowledge on various topics, including signature definition, detection methodologies, sample set assembly, existing protection testing, data generation, rule writing, and intelligence gathering. Examine specific examples such as register32 detection, FTP WebDAV, argument reordering, and HTTPS SCT Detection. Understand the attack lifecycle and the significance of knowing your tools and new application techniques in the ever-evolving landscape of cybersecurity. Read more

Signatures Are Dead - Long Live Resilient Signatures

BruCON Security Conference
Add to list