filmov
tv
Threat Hunting via DNS with Eric Conrad - SANS Blue Team Summit 2020

Показать описание
DNS logs are one of the most powerful threat hunting resources, but encryption is rapidly changing that equation.
Key DNS threat hunting techniques include detecting DNS tunneling and Domain Generation Algorithms (DGAs). It used to be simple(r): log DNS requests and responses on DNS forwarders, or sniff and analyze via tools like Zeek.
DNS over TLS (DoT) and DNS over HTTPS (DoH) are disrupting the status quo: where does that leave network defenders? This talk will analyze the current state of DNS monitoring, and provide actionable steps for detecting malice on your network via DNS.
Eric Conrad @eric_conrad Fellow, SANS Institute
Key DNS threat hunting techniques include detecting DNS tunneling and Domain Generation Algorithms (DGAs). It used to be simple(r): log DNS requests and responses on DNS forwarders, or sniff and analyze via tools like Zeek.
DNS over TLS (DoT) and DNS over HTTPS (DoH) are disrupting the status quo: where does that leave network defenders? This talk will analyze the current state of DNS monitoring, and provide actionable steps for detecting malice on your network via DNS.
Eric Conrad @eric_conrad Fellow, SANS Institute
Threat Hunting via DNS with Eric Conrad - SANS Blue Team Summit 2020
Threat Hunting via DNS | SANS@MIC Talk
WORKSHOP: Threat Hunting using Active and Passive DNS | DomainTools | WWHF Deadwood 2022
DIY DNS DFIR: You’re Doing it WRONG: Threat Hunting Summit 2016
Threat Hunting Shorts - C2 over DNS | Chris Brenton
Cybersecurity Threat Hunting Explained
Uncovering and Visualizing Malicious Infrastructure - SANS Threat Hunting Summit 2018
Threat Hunting with Network Flow - SANS Threat Hunting Summit 2017
Threat Hunting via Sysmon - SANS Blue Team Summit
Threat Hunting Using DNSTwist CyberChef DeepBlueCLI Teler
Network Threat Hunting Made Easy (Finding Hackers)
Expanding The Hunt: A Case Study in Pivoting Using Passive DNS and Full PCAP - SANS DFIR Summit 2016
WORKSHOP: Advanced Passive DNS Search Techniques for Cyber Investigations | DomainTools | WWHF &apos...
My “Aha!” Moment - Methods, Tips, & Lessons Learned in Threat Hunting - SANS THIR Summit 2019...
How to threat hunt in your SIEM with the right network data
2024-04-12 Cyber Threat Hunting Level 1 - Chris Brenton
Eduard Kiiko and Danial Zhuravchak - Threat Hunting: DNS security
Keynote: Threat Hunting: Old Data, New Tricks!
Understanding Sysmon & Threat Hunting with A Cybersecurity Specialist & Incident Detection E...
Threat Hunting Beacon Analysis
DNS Tunneling Explained
Data matters: More effective threat hunting and defense with internet scan data
The Basics of the Threat Hunting Process with Security Weekly and LogRhythm
Advanced Threat Hunting: Checking IPs returned by DNS Queries with 'COVID and Corona'
Комментарии