filmov
tv
Все публикации
0:10:56
Network forensics using Security Onion 2 - How to Triage a PCAP
0:20:09
What is Yara, introduction to Yara language, uses cases, simple rule logic
0:14:23
What is EDR / XDR, problems / shortcomings of EDR solutions, PROS and CONS and comparison with NSM
0:17:28
Introduction to Sysmon, Sysmon events and endpoint security monitoring
0:19:02
What is MITRE ATT&CK, how it can be used, PROS and CONS
0:18:28
Introduction to Zeek network security monitoring, conn.log and pivoting with Zeek UIDs
0:15:35
Network forensics and PCAP investigations using Brim for malware analysis (Suricata + Zeek)
0:07:34
How to run Suricata in your macOS system
0:11:34
How to hunt Cobalt Strike C2s using Threat Intelligence
0:22:27
Introduction to network forensics using Zeek (Bro), Snort and OSINT
0:03:02
Where to find malicious traffic and file examples for malware exercises
0:03:49
How to analyze malicious office documents (dumping macro and extracting IOCs) #malware