filmov
tv
Leveraging Beacon Detection Techniques to Identify Anomalous Logons | 2020 THIR Summit

Показать описание
Attackers attempting to compromise passwords via brute forcing or password spraying usually do so with the help of automated scripts. Sophisticated versions of these scripts may borrow techniques from C2 frameworks, such as implementing sleep timers and jitter between login attempts. In this talk, we'll walk through how we applied C2 beacon analysis techniques to look for evidence of an adversary performing password spraying.
Speakers
Fred Nolte,- Senior Cybersecurity Analyst, Threat Hunting, Target
Nikita Jain, Cybersecurity Analyst, Incident Response, Target
Dante Razo, - Intern, Incident Response, Target
Jacob Alongi, - Intern, Incident Response, Target
Speakers
Fred Nolte,- Senior Cybersecurity Analyst, Threat Hunting, Target
Nikita Jain, Cybersecurity Analyst, Incident Response, Target
Dante Razo, - Intern, Incident Response, Target
Jacob Alongi, - Intern, Incident Response, Target
Leveraging Beacon Detection Techniques to Identify Anomalous Logons | 2020 THIR Summit
Understanding Beacon Detection with CylanceGATEWAY
Detecting Malware Beacons with Zeek and RITA
Vijay Sanjos Alexander- Leveraging BLE beacons for proximity & positioning
Traditional and Advanced Techniques for Network Beacon Detection
09. x33fcon 2019 - Hunting beacons by Bartosz Jerzman
How Creators & Managers Can Leverage AI with Beacons Ft: Team Beacons!
Atlassian Beacon: Intelligent Threat Detection and Remediation | Atlassian
BSidesFortWayne 2022 - Using open source algorithms for C2 beacon detection with Microsoft Sentinel
Leveraging User Behavior for Cyber Threat Hunting
Aggressive Autonomous Actions - Operating with Automation
Cracking the Beacon: Automating the Extraction of Implant Configurations
Understanding C2 Beacons - Part 1 of 2 | Malware of the Day
A|C — Beacon Analysis – The Key to Cyber Threat Hunting | Chris Brenton
ISE 2016: Crestron Electronics Introduces Fusion Cloud with PinPoint Proximity Detection Beacon
Hunting the beacon: CLBeaconRegion – Detect-a-Beacon, part 3
Using proximity beacons to extract insight from off-line interactions - Kantar
01. Keynote: How I Met Your Beacon by Dominic Chell
Threat Hunting Beacon Analysis
Mining The Shadows with ZoidbergStrike: A Scanner for Cobalt Strike
Keynote: Threat Hunting: Old Data, New Tricks!
Learn How Growy Leverages IoT and Modern Data Management for the Future of Farming
Keynote: Cobalt Strike Threat Hunting | Chad Tilbury
Unlimited Beacons & Geofence capabilities
Комментарии