ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

Using Zeek/Bro To Discover Network TTPs of MITRE ATT&CK™ Part 1

Автор: Corelight

Загружено: 2019-01-25

Просмотров: 12869

Описание: Techniques, tactics, and procedures (TTPs) are useful for characterizing patterns of adversary behavior, such as sending a spearphishing attachment for initial access or using the Remote Desktop Protocol to move laterally in a target environment.

To comprehensively track TTPs and develop corresponding defense strategies, security pros increasingly turn to MITRE ATT&CK™, a TTP repository based on real-world observations. While no single technology nor process can cover all TTPs, did you know that the Zeek Network Security Monitor (formerly “Bro”) can give you powerful visibility and detection against critical TTPs in the MITRE ATT&CK™ framework?

Watch this webcast to hear from world-class security operators Richard Bejtlich and James Schweitzer as they dig into the MITRE framework and review concrete, step-by-step examples of how you can use Zeek to significantly improve your visibility and defenses against lateral movement (TA0008), data exfiltration (TA0010), and command and control (C2) (TA0011) tactics.

Corelight makes powerful network security monitoring (NSM) solutions that transform network traffic into rich logs, extracted files, and security insights, helping security teams achieve more effective incident response, threat hunting, and forensics. Corelight Sensors run on Zeek (formerly called “Bro”), the open-source NSM tool used by thousands of organizations worldwide. Corelight’s family of network sensors dramatically simplify the deployment and management of Zeek and expand its performance and capabilities. Corelight is based in San Francisco, California and its global customers include Fortune 500 companies, large government agencies, and major research universities.

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
Using Zeek/Bro To Discover Network TTPs of MITRE ATT&CK™ Part 1

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

Threat Hunting Masterclass: Three Data Science Notebooks to Find Bad Actors in Your Network Logs

Threat Hunting Masterclass: Three Data Science Notebooks to Find Bad Actors in Your Network Logs

Putting MITRE ATT&CK™ into Action with What You Have, Where You Are presented by Katie Nickels

Putting MITRE ATT&CK™ into Action with What You Have, Where You Are presented by Katie Nickels

How To Threat Hunt in Encrypted Network Traffic

How To Threat Hunt in Encrypted Network Traffic

An Introduction to Threat Hunting With Zeek (Bro)

An Introduction to Threat Hunting With Zeek (Bro)

Workshop: MITRE ATT&CK Fundamentals

Workshop: MITRE ATT&CK Fundamentals

Machine Learning with Zeek and Tensorflow (Part 1): Talking to Zeek

Machine Learning with Zeek and Tensorflow (Part 1): Talking to Zeek

SASE Made Easy with Cisco | Simplify Security and Networking for the Modern Enterprise

SASE Made Easy with Cisco | Simplify Security and Networking for the Modern Enterprise

A Technical Introduction to Zeek/Bro, Network Security's Best Kept Secret

A Technical Introduction to Zeek/Bro, Network Security's Best Kept Secret

How to Spot C2 Traffic on Your Network

How to Spot C2 Traffic on Your Network

How to hunt with Zeek + Sigma

How to hunt with Zeek + Sigma

Zeek in Action, Video 1, Suspected Malware Compromise

Zeek in Action, Video 1, Suspected Malware Compromise

MITRE Practical Use Cases

MITRE Practical Use Cases

OSINT для новичков: найдите всё о юзернейме и фото с Sherlock и Google Dorks!

OSINT для новичков: найдите всё о юзернейме и фото с Sherlock и Google Dorks!

Threat Hunting via DNS | SANS@MIC Talk

Threat Hunting via DNS | SANS@MIC Talk

OpenClaw: чит-код для продуктивности или подарок хакерам?

OpenClaw: чит-код для продуктивности или подарок хакерам?

Swiss tables в Go. Наиболее полный разбор внутреннего устройства новой мапы

Swiss tables в Go. Наиболее полный разбор внутреннего устройства новой мапы

Разместил ВАКАНСИЮ на FRONTEND разработчика. В шоке от откликов и резюме. Выводы

Разместил ВАКАНСИЮ на FRONTEND разработчика. В шоке от откликов и резюме. Выводы

Using awk to analyze Bro logs by Mark Krenz

Using awk to analyze Bro logs by Mark Krenz

Свой ВПН сервер Vless с собственным сайтом

Свой ВПН сервер Vless с собственным сайтом

Wazuh Crash Course | 2 Hour+ Free Course(Must for Security Analyst)

Wazuh Crash Course | 2 Hour+ Free Course(Must for Security Analyst)

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]