filmov
tv
CC10 - Network Forensics Analysis
Показать описание
CactusCon 10 (2022) Talk
Network Forensics Analysis
Rami Al-Talhi
Advanced Persistent Threat (APT) groups do not like to have the evidence of their crime into their targets, usually, they would develop or use file-less malware to not leave any fingerprints traces proof their crime and unleashed their operations. Network forensics analysis became an essential skills to uncover APTs operation and identify what has happened by utilizing Wireshark and other open-source tools to analyze network packet captures (PCAP). In this lecture, we will introduce couple of APT attack scenarios and walk-through how to analyze them.
Rami has experience across different information security and cybersecurity fields for over 13years. Worked as Incident Response Expert in the past for four years to handle different cyber incident and events. Provided DFIR and Cyber Range training for different regions in the world (Europe, Asia, Middle East and US). Dealt with different sophisticated APT cyber incident cases that ranging from cyber espionage until data destruction.
Network Forensics Analysis
Rami Al-Talhi
Advanced Persistent Threat (APT) groups do not like to have the evidence of their crime into their targets, usually, they would develop or use file-less malware to not leave any fingerprints traces proof their crime and unleashed their operations. Network forensics analysis became an essential skills to uncover APTs operation and identify what has happened by utilizing Wireshark and other open-source tools to analyze network packet captures (PCAP). In this lecture, we will introduce couple of APT attack scenarios and walk-through how to analyze them.
Rami has experience across different information security and cybersecurity fields for over 13years. Worked as Incident Response Expert in the past for four years to handle different cyber incident and events. Provided DFIR and Cyber Range training for different regions in the world (Europe, Asia, Middle East and US). Dealt with different sophisticated APT cyber incident cases that ranging from cyber espionage until data destruction.
CC10 - Network Forensics Analysis
Analysis, Network Forensic 1st Steps - 22 April 2021
CC10 - PacketSifter and Leveraging TShark for Network Traffic Analysis
How To Network Forensics Cyberdefense VM
CC10 - Nits Among Your Bits: A Dive into LockВit Ransomware Operations
CC10 - Dissecting the Ransomware Kill Chain: Why Companies Need It
CC10 - Building a Ransomware Incident Response Plan
CYBER FORENSIC-Advanced Network Forensics Analyzing Packet Traffic Using Wireshark Forensics digital
08 Wireshark Network Forensic Case Studies | Learn Wireshark
Advanced Wireshark Network Forensics
CC10 - Artificial Intelligence: Friend or Foe
CC10 - How Nefilim Dropper uses Polymorphism
CC10 - Threat Hunting: Becoming the Predator and No Longer the Prey
The Hitchhiker’s Guide to Evidence Sources - SANS Webcast
CC10 - Hunting Phish Kits
CC10 - Operationalized Purple Teaming
CMU 14822 - Host Based Forensics - Project Proposal
Did I do that? - Understanding action & artifacts w/ Matthew Seyer & David Cowen - SANS DFIR...
How Supercomputer-scale Neural Network Models Apply to Defensive Cybersecurity Problems
Magnet Forensics Presents: Cache Up Ep.2 - Mari DeGrazia
Hack.lu 2017 Digital Vengeance: Exploiting Notorious C&C Toolkits by Waylon Grange
Survey Papers on Deep Learning based Malware Detection
Malware obfuscation techniques and countermeasures
The Cyber Kill Chain: Uncover the Secrets that Keep Hackers Out!
Комментарии