filmov
tv
Threat Hunting Tutorial- Day1
![preview_player](https://i.ytimg.com/vi/6UQc3BIxXDg/maxresdefault.jpg)
Показать описание
Threat hunting is the practice of proactively searching for cyber threats that are lurking undetected in a network. Cyber threat hunting digs deep to find malicious actors in your environment that have slipped past your initial endpoint security defenses.
After sneaking in, an attacker can stealthily remain in a network for months as they quietly collect data, look for confidential material, or obtain login credentials that will allow them to move laterally across the environment.
Once an adversary is successful in evading detection and an attack has penetrated an organization’s defenses, many organizations lack the advanced detection capabilities needed to stop the advanced persistent threats from remaining in the network. That’s why threat hunting is an essential component of any defense strategy.
Today is Day1 of Threat Hunting Tutorial and today we will cover-
1. Threat Hunting Maturity Model
2. Threat Hunting Loop
3. Pyramid of Pain
We will also show a practical demo how can you perform Retro-Hunt using Yara in Virustotal.
🔗Related Episodes-
-------------------------------------------------------------------------------------------------------------------------
WATCH BELOW Playlists as well, if you want to make your career in DFIR and Security Operations!!
-------------------------------------------------------------------------------------------------------------------------
⌚
Timelines
-------------------------------------------------------------------------------------------------------------------------
0:00 ⏩ Introduction
1:08 ⏩ Threat Hunt Maturity Model
12:16 ⏩ Threat Hunting Loop
20:15 ⏩ Pyramid of Pain
25:27 ⏩ Retro Hunt for Lapsus
35:16 ⏩ Summarize
📞📲
FOLLOW ME EVERYWHERE-
-------------------------------------------------------------------------------------------------------------------------
✔ Twitter: @blackperl_dfir
SUPPORT BLACKPERL
-------------------------------------------------------------------------------------------------------------------------
╔═╦╗╔╦╗╔═╦═╦╦╦╦╗╔═╗
║╚╣║║║╚╣╚╣╔╣╔╣║╚╣═╣
╠╗║╚╝║║╠╗║╚╣║║║║║═╣
╚═╩══╩═╩═╩═╩╝╚╩═╩═╝
➡️ SUBSCRIBE, Share, Like, Comment
-------------------------------------------------------------------------------------------------------------------------
🙏 Thanks for watching!! Be CyberAware!! 🤞
After sneaking in, an attacker can stealthily remain in a network for months as they quietly collect data, look for confidential material, or obtain login credentials that will allow them to move laterally across the environment.
Once an adversary is successful in evading detection and an attack has penetrated an organization’s defenses, many organizations lack the advanced detection capabilities needed to stop the advanced persistent threats from remaining in the network. That’s why threat hunting is an essential component of any defense strategy.
Today is Day1 of Threat Hunting Tutorial and today we will cover-
1. Threat Hunting Maturity Model
2. Threat Hunting Loop
3. Pyramid of Pain
We will also show a practical demo how can you perform Retro-Hunt using Yara in Virustotal.
🔗Related Episodes-
-------------------------------------------------------------------------------------------------------------------------
WATCH BELOW Playlists as well, if you want to make your career in DFIR and Security Operations!!
-------------------------------------------------------------------------------------------------------------------------
⌚
Timelines
-------------------------------------------------------------------------------------------------------------------------
0:00 ⏩ Introduction
1:08 ⏩ Threat Hunt Maturity Model
12:16 ⏩ Threat Hunting Loop
20:15 ⏩ Pyramid of Pain
25:27 ⏩ Retro Hunt for Lapsus
35:16 ⏩ Summarize
📞📲
FOLLOW ME EVERYWHERE-
-------------------------------------------------------------------------------------------------------------------------
✔ Twitter: @blackperl_dfir
SUPPORT BLACKPERL
-------------------------------------------------------------------------------------------------------------------------
╔═╦╗╔╦╗╔═╦═╦╦╦╦╗╔═╗
║╚╣║║║╚╣╚╣╔╣╔╣║╚╣═╣
╠╗║╚╝║║╠╗║╚╣║║║║║═╣
╚═╩══╩═╩═╩═╩╝╚╩═╩═╝
➡️ SUBSCRIBE, Share, Like, Comment
-------------------------------------------------------------------------------------------------------------------------
🙏 Thanks for watching!! Be CyberAware!! 🤞
Комментарии