ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

How to Spot C2 Traffic on Your Network

Автор: Corelight

Загружено: 2021-07-30

Просмотров: 6243

Описание: Attackers often hide their command and control (C2) activity using techniques like encryption, tunneling in noisy traffic like DNS, or domain generation algorithms to evade blacklists.

Reliably spotting C2 traffic requires a comprehensive network security monitoring capability like open source Zeek that transforms packets into connection-linked protocol logs that let analysts make fast sense of traffic. Corelight’s commercial NDR solutions generate this Zeek network evidence and also provide dozens of proprietary C2 insights and detections.

Tune into this webcast for technical demonstrations of how security analysts can use Zeek logs and Corelight insights to identify dozens of C2 techniques in their environment.

Speakers:

Vince Stoffer, Sr. Director of Product Management, Corelight

Vince Stoffer is Sr. Director of Product Management at Corelight and previously held security engineering and network management positions at Lawrence Berkeley National Laboratory and before that served as a network security engineer at Reed College. Vince holds the CISSP, GCIH and GCIA certifications.

Matt Bromiley, SANS Instructor

Matt Bromiley is a principal incident response consultant at a top digital forensics and incident response (DFIR) firm. In the DFIR firm Matt assists clients with incident response, digital forensics, and litigation support. He also serves as a GIAC Advisory Board member, a subject-matter expert for the SANS Security Awareness, and a technical writer for the SANS Analyst Program. Matt brings his passion for digital forensics to the classroom as a SANS Instructor for FOR508: Advanced Incident Response, Threat Hunting and Digital Forensics, and FOR572: Advanced Network Forensics, where he focuses on providing students with implementable tools and concepts.

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
How to Spot C2 Traffic on Your Network

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

How To Threat Hunt in Encrypted Network Traffic

How To Threat Hunt in Encrypted Network Traffic

An Introduction to Threat Hunting With Zeek (Bro)

An Introduction to Threat Hunting With Zeek (Bro)

Поиск угроз через Sysmon — саммит SANS Blue Team

Поиск угроз через Sysmon — саммит SANS Blue Team

DNS Remote Code Execution: Finding the Vulnerability 👾 (Part 1)

DNS Remote Code Execution: Finding the Vulnerability 👾 (Part 1)

How to Threat Hunt for C2 Traffic Regardless of Protocol or Port

How to Threat Hunt for C2 Traffic Regardless of Protocol or Port

SANS Webcast: Hacker Techniques - Covert Command and Control

SANS Webcast: Hacker Techniques - Covert Command and Control

BHIS | Modern C2 and Data Exfiltration w/ Kyle Avery (1-Hour)

BHIS | Modern C2 and Data Exfiltration w/ Kyle Avery (1-Hour)

Как аналитики SOC на самом деле исследуют сетевой трафик (пошаговый обзор Wireshark)

Как аналитики SOC на самом деле исследуют сетевой трафик (пошаговый обзор Wireshark)

Using Zeek/Bro To Discover Network TTPs of MITRE ATT&CK™ Part 1

Using Zeek/Bro To Discover Network TTPs of MITRE ATT&CK™ Part 1

Putting MITRE ATT&CK™ into Action with What You Have, Where You Are presented by Katie Nickels

Putting MITRE ATT&CK™ into Action with What You Have, Where You Are presented by Katie Nickels

A Technical Introduction to Zeek/Bro, Network Security's Best Kept Secret

A Technical Introduction to Zeek/Bro, Network Security's Best Kept Secret

Chill Mood Music 🎧 – Spanish & French Relaxing Playlist

Chill Mood Music 🎧 – Spanish & French Relaxing Playlist

Как расшифровывать протокол TLS в Wireshark | Компьютерные сети - 44

Как расшифровывать протокол TLS в Wireshark | Компьютерные сети - 44

Threat Hunting Tutorial: How to use Network Metadata to detect threats

Threat Hunting Tutorial: How to use Network Metadata to detect threats

DEF CON 29 Adversary Village - Daniel Duggan - Designing a C2 Framework

DEF CON 29 Adversary Village - Daniel Duggan - Designing a C2 Framework

Свой ВПН сервер Vless с собственным сайтом

Свой ВПН сервер Vless с собственным сайтом

Raspberry Pi sensors for home networks

Raspberry Pi sensors for home networks

2024-09-06 Cyber Threat Hunting Level 1 |  Chris Brenton #infosec #training #freetraining

2024-09-06 Cyber Threat Hunting Level 1 | Chris Brenton #infosec #training #freetraining

The Power of Open-Source Zeek (formerly Bro)

The Power of Open-Source Zeek (formerly Bro)

The Cycle of Cyber Threat Intelligence

The Cycle of Cyber Threat Intelligence

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]