Главная
Study mode:
on
1
Intro
2
LinkedIn Page
3
Pastebin script
4
Outline
5
Dr Dorothy Denning
6
Baselines
7
Tools
8
Anomalies
9
User Entity Behavioral Analysis
10
Poisoning Data
11
Preventing Behavioral Spoofing
12
Pump and Dump
13
Pocket Dimension
14
Bridge Network
15
UDP
16
Netcat
17
UDP Spray
18
Fake traffic
19
API curls
20
Baseline boiling
21
Analysis
22
How to remediate
23
Questions
Description:
Explore techniques for circumventing Network Behavior Anomaly Detection (NBAD) and User and Entity Behavior Analytics (UEBA) in this 29-minute conference talk from BSides Tampa 2020. Delve into topics such as baselining, anomaly detection, data poisoning, and behavioral spoofing prevention. Learn about various tools and methods including pump and dump techniques, pocket dimensions, bridge networks, and UDP spraying. Gain insights on creating fake traffic, API curls, and baseline boiling. Conclude with an analysis of these techniques and discover remediation strategies to enhance network security.

Breaking NBAD and UEBA Detection

Add to list