Главная
Study mode:
on
1
Intro
2
Agenda
3
What is Threat Hunting
4
What does it all require
5
Choosing a model
6
Application shimming
7
Attack Miter Framework
8
Prerequisites
9
Where do we begin
10
System perspective
11
Hunting signature
12
Account creation
13
Windows Admin Shares
14
Windows Event Logs
15
Executable Launch from Extracted Archive
16
Job Impression
17
Hunting Time
18
Hunting Lateral Movement
19
Hunting Network Connections
20
Hunting Web Shells
21
Advanced Threat Hunting
22
shim cache hunting
23
build a hunting dashboard
24
be proactive
25
create a dashboard
26
create custom signatures
27
download the free utilities
28
wrap up
Description:
Explore effective threat hunting techniques in this 40-minute RSA Conference talk by Tim Bandos, CISO of Digital Guardian. Learn how to stay ahead of hackers through innovative strategies, including application shimming, attack MITRE framework, and Windows admin shares analysis. Discover prerequisites for successful threat hunting, gain insights into system perspectives, and understand how to hunt for lateral movement, network connections, and web shells. Delve into advanced techniques like shim cache hunting, building custom dashboards, and creating proactive signatures. Acquire practical tips to plan, develop, and execute your own threat hunting techniques, leveraging free utilities and best practices shared by an experienced threat hunting team.

Hunt and Gather - Developing Effective Threat Hunting Techniques

RSA Conference
Add to list