Главная
Study mode:
on
1
Introduction
2
Who is Alex Davies
3
The beginning of threat hunting
4
What is threat hunting
5
Manual vs automated
6
The Paris Model
7
Manual vs Automation
8
Shadow Brokers
9
Where do you begin
10
Attack Framework
11
Data Source
12
Analysis
13
Hashes
14
TTPs
15
Endpoints
16
Network Tools
17
Memory Injection
18
Frequency Analysis
19
Machine Learning
20
Automation
21
Practical tips
22
Quick insider attack
23
Imhotep
24
How to do defense better
25
How to do detection
26
The Red Team
Description:
Explore the evolution and practical application of threat hunting in cybersecurity through this Security BSides London conference talk. Delve into the distinction between traditional security monitoring and modern threat hunting techniques. Discover key datasets, analytical approaches, and cutting-edge Tactics, Techniques, and Procedures (TTPs) essential for effective threat hunting at scale. Learn about real-world compromises that evaded traditional detection methods but were uncovered through hands-on threat hunting. Gain insights into the Paris Model, manual vs. automated approaches, and the impact of events like the Shadow Brokers leak. Examine various data sources, analysis techniques, and tools used in threat hunting, including hashes, endpoints, network tools, and memory injection. Understand the role of frequency analysis, machine learning, and automation in enhancing threat detection capabilities. Acquire practical tips for implementing threat hunting, including a quick insider attack demonstration and the use of tools like Imhotep. Explore strategies for improving defense and detection methods, and gain perspective on the relationship between threat hunting and Red Team activities. Read more

Hunt Or Be Hunted

Security BSides London
Add to list