ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

Living off the Land: Native Windows Tools for Blue Team Analysis

Автор: Software Engineering Institute | Carnegie Mellon University

Загружено: 2019-06-28

Просмотров: 759

Описание: “Living off the land” is a term used by penetration testers describing the use of tools readily available on a target machine. In this presentation, Christopher I. Rodman (a Cyber Security Engineer in the CERT Division at the Software Engineering Institute) identifies programs and scripts native to Windows-based machines, and provides demonstrations of how different methods can be leveraged to collect information for incident response and forensic analysis.

Demonstrations:
2:30 - Obtain Local User and Group Information
5:27 - Target Specific Events in Event Log and Text Log Files
8:18 - Obtain a List of Running Processes and Loaded Libraries
11:30 - Obtain Scheduled Task and Service Information
14:49 - Get Drive, Files and Registry Key Information
19:49 - Collect Network Adapter, Connections and Cached Information

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
Living off the Land: Native Windows Tools for Blue Team Analysis

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

Visibility Through the Clouds with Network Flow Logs

Visibility Through the Clouds with Network Flow Logs

Acquisition Oversight for Software Assurance

Acquisition Oversight for Software Assurance

Software Acquisition Pathway: Ready, Set, Go!

Software Acquisition Pathway: Ready, Set, Go!

With a Little Help from Our Civilian Friends: Cybersecurity Reserve Is Both Feasible and Advisable

With a Little Help from Our Civilian Friends: Cybersecurity Reserve Is Both Feasible and Advisable

Linus Tech Tips Tries Linux (Again), a Guru of Sudo Reacts

Linus Tech Tips Tries Linux (Again), a Guru of Sudo Reacts

Maturing AI Adoption From Chaos to Consistency

Maturing AI Adoption From Chaos to Consistency

Intro to AI Security

Intro to AI Security

Intro to AI Security Episode 4 - Adversarial Machine Learning

Intro to AI Security Episode 4 - Adversarial Machine Learning

Temporal Memory Safety in C and C++: An AI-Enhanced Pointer Ownership Model

Temporal Memory Safety in C and C++: An AI-Enhanced Pointer Ownership Model

Right-Sized DevSecOps: How Tooling Complexity Breaks Modern Pipelines

Right-Sized DevSecOps: How Tooling Complexity Breaks Modern Pipelines

Leveraging AI to Build Cyber Capacity

Leveraging AI to Build Cyber Capacity

【OpenAI公式】Codexを使いこなす方法!プロンプト4要素やコンテキストエンジニアリングの基礎を解説

【OpenAI公式】Codexを使いこなす方法!プロンプト4要素やコンテキストエンジニアリングの基礎を解説

Formalizing and Automating STPA with Robustness

Formalizing and Automating STPA with Robustness

Nowe Apple, nowe DJI… i coś z IKEA

Nowe Apple, nowe DJI… i coś z IKEA

HAT TRICK VALVERDE! KOSMOS NA BERNABEU! REAL - MAN CITY, SKRÓT

HAT TRICK VALVERDE! KOSMOS NA BERNABEU! REAL - MAN CITY, SKRÓT

AI for the Warfighter: Acquisition Challenges and Guidance

AI for the Warfighter: Acquisition Challenges and Guidance

Представляем Digital Optimus: смелое новое видение Илона Маска в области искусственного общего ин...

Представляем Digital Optimus: смелое новое видение Илона Маска в области искусственного общего ин...

Five examples of adversarial machine learning attacks

Five examples of adversarial machine learning attacks

7 GOLI W PARYŻU! POTĘŻNE PSG ROZBIJA CHELSEA! PSG - CHELSEA, SKRÓT MECZU

7 GOLI W PARYŻU! POTĘŻNE PSG ROZBIJA CHELSEA! PSG - CHELSEA, SKRÓT MECZU

🔴 Kim byli naprawdę? Historia zmienianych nazwisk w PRL

🔴 Kim byli naprawdę? Historia zmienianych nazwisk w PRL

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]