Главная
Study mode:
on
1
RSAConference 2019 San Francisco March 4-8 Moscone Center
2
Know Your Environment
3
"Blueprinting" Methods Reactive • Firehose
4
Tools and Procedures
5
Intro to OsQuery
6
Pros/Cons
7
Low Prevalence Executables
8
Leveraging OsQuery
9
Getting ARP data from OsQuery
10
Automation Overview
11
Where do you put your data?
12
Data Collection
13
Data Storage
14
Querying Data
15
Docker
16
Filebeat
17
Next Steps
18
Using Statistical Analysis for Threat Hunting
19
Analyzing Data
20
Hunting Methodologies
21
Mac Addresses - Uncommon Environmental OUIS
22
Prevalence of Executables
23
Filtering Data
24
Mass Searching
25
A Story of Two Executables (PLink)
Description:
Explore advanced SOC techniques in this conference talk focusing on enterprise blueprinting, automation, and threat hunting using open-source tools. Gain insights into building comprehensive network visibility, reducing SOC fatigue through task automation, and conducting effective hunts for unknown threats. Learn to leverage native operating system tools and osquery for network blueprinting, implement automation strategies for critical tasks, and utilize properly collected and organized data for advanced threat detection. Discover methods for analyzing low prevalence executables, leveraging OsQuery for ARP data collection, and implementing Docker and Filebeat for efficient data management. Delve into statistical analysis techniques for threat hunting, including methodologies for identifying uncommon environmental OUIs and executable prevalence. Master the art of filtering data, conducting mass searches, and uncover real-world examples of threat detection through the examination of specific executables like PLink. Read more

SOC Automation - Enterprise Blueprinting and Hunting Using Open-Source Tools

RSA Conference
Add to list