Главная
Study mode:
on
1
Intro
2
What is intrusion detection
3
What is anomaly detection
4
What is NBAD
5
Security Operations
6
Data Poisoning
7
Data Exfiltration
8
Initial Access
9
Pump Dump
10
Docker
11
Pocket Dimension
12
Network Bridge
13
Spoofing
14
Syslog
15
Live Demo
16
Nonrepudiation
17
Samplingider
18
TLS
19
In Probe
20
REST API
21
Network Scan
22
Baseline Boiling
23
Recap
Description:
Explore advanced techniques for circumventing Network Behavior Anomaly Detection (NBAD) and User and Entity Behavior Analytics (UEBA) in this informative conference talk from GrrCON 2019. Delve into the fundamentals of intrusion detection, anomaly detection, and security operations before examining sophisticated methods of data poisoning, exfiltration, and initial access. Learn about innovative approaches such as pump dump, Docker exploitation, and network bridging. Witness a live demonstration of nonrepudiation techniques, sampling, and TLS manipulation. Gain insights into REST API vulnerabilities, network scanning, and baseline manipulation to enhance your understanding of cybersecurity challenges and defenses.

Breaking NBAD & UEBA Detection

Add to list