filmov
tv
Detecting Command and Control Frameworks via Sysmon and Windows Event Logging
Показать описание
Prevention eventually fails. Bypassing tools such as Windows Defender Antivirus may be challenging, but it can be done. What then? What's left? Command and control (C2) frameworks such as Cobalt Strike, Sliver, and Metasploit typically leave telltale signs of their presence. This talk will largely be demo-based, showing how to analyze Windows event logs (including Sysmon logs) to hunt for traces left behind by modern C2 frameworks.
About the Speaker
Eric Conrad, a SANS Faculty Fellow and course author of three popular SANS courses. He has over 28 years of information security experience , has created numerous tools and co-authored the CISSP Study Guide. Eric is the Chief Technology Officer (CTO) of Backshore Communications, a company focusing on hunt teaming, intrusion detection, incident handling, and penetration testing. He is a graduate of the SANS Technology Institute with a Master of Science degree in Information Security Engineering and also holds various industry certifications including the Certified Information Systems Security Professional (CISSP), GSE, GPEN, GCIH, GCIA, GCFA, GAWN, and GSEC.
About the Speaker
Eric Conrad, a SANS Faculty Fellow and course author of three popular SANS courses. He has over 28 years of information security experience , has created numerous tools and co-authored the CISSP Study Guide. Eric is the Chief Technology Officer (CTO) of Backshore Communications, a company focusing on hunt teaming, intrusion detection, incident handling, and penetration testing. He is a graduate of the SANS Technology Institute with a Master of Science degree in Information Security Engineering and also holds various industry certifications including the Certified Information Systems Security Professional (CISSP), GSE, GPEN, GCIH, GCIA, GCFA, GAWN, and GSEC.
Detecting Command and Control Frameworks via Sysmon and Windows Event Logging
What is a command and control (C2) server?
Detecting the Sliver C2 Framework | Threat SnapShots
How Hackers Use netsh.exe For Persistence & Code Execution (Sliver C2)
The Command and Control (C2) Matrix
BlueHat v18 || Overt Command & Control: The Art of Blending In
What is command and control?
BG - Koadic C3 - Windows COM Command & Control Framework - Sean Dillon & Zach Harding
Introduction to the C2 Matrix - a Comparison of Command and Control Frameworks #C2Matrix
🔴 Command & Control (C2) Explained
Adversary Emulation and the C2 Matrix
DEF CON 24 - Brad Woodberg - Malware Command and Control Channels: A journey into darkness
MITRE 'Command and Control' explained under 1 minute
ZeekWeek 2022 - CatchM3ifuKan - Detecting Command-and-Control Techniques Up and Down the Stack
Command & Control (C2) Framework - SpyderC2 : Android Payload Generation
HAVOC C2 - Demon Bypasses Windows 11 Defender
C2 Matrix | SANS@MIC Talk
Introduction to Command and Control Servers | TryHackMe Red Team Track
Showcasing Sliver C2 (Command and Control) \\UserWare
Cyber Kill Chain Framework | Reconnaissance | Command and Control | Daniel Rawat
Detecting Cloud Command and Control By Dagmawi Mulugeta (2022)
SANS Webcast: Hacker Techniques - Covert Command and Control
Cyber Kill Chain - Command and Control
Command and Control Introduction | Day 18 (High-Level)
Комментарии