![Threat Hunter's Daily](/img/default-banner.jpg)
- Видео 12
- Просмотров 9 451
Threat Hunter's Daily
Добавлен 29 дек 2019
Defensive security, malware analysis, forensics, network forensics, incident response tips and tricks.
Network forensics using Security Onion 2 - How to Triage a PCAP
Network forensics using Security Onion 2, community id pivoting between Zeek and Suricata, how to replay PCAP and triage PCAP traffic
Просмотров: 89
Видео
What is Yara, introduction to Yara language, uses cases, simple rule logic
Просмотров 267Год назад
What is Yara, introduction to Yara language, uses cases, simple rule logic
What is EDR / XDR, problems / shortcomings of EDR solutions, PROS and CONS and comparison with NSM
Просмотров 29Год назад
What is EDR / XDR, problems / shortcomings of EDR, PROS and CONS and comparison with NSM
Introduction to Sysmon, Sysmon events and endpoint security monitoring
Просмотров 68Год назад
Introduction to Sysmon, Sysmon events and endpoint security monitoring #sysmon
What is MITRE ATT&CK, how it can be used, PROS and CONS
Просмотров 67Год назад
What is MITRE ATT&CK, how it can be used, PROS and CONS #mitre #att&ck #cti
Introduction to Zeek network security monitoring, conn.log and pivoting with Zeek UIDs
Просмотров 1,8 тыс.Год назад
Introduction to Zeek network security monitoring, conn.log and pivoting with Zeek UIDs #zeek #bro #nsm
Network forensics and PCAP investigations using Brim for malware analysis (Suricata + Zeek)
Просмотров 4,1 тыс.3 года назад
Network forensics and PCAP investigations using Brim for malware analysis (Suricata Zeek)
How to run Suricata in your macOS system
Просмотров 1,9 тыс.3 года назад
How to run #Suricata in your local macOS system using brew (also some #zeek)
How to hunt Cobalt Strike C2s using Threat Intelligence
Просмотров 2763 года назад
In this video, we'll see how to hunt Cobalt Strike C2 servers using ZoomEye, Virustotal and any.run #threatintel #threathunting
Introduction to network forensics using Zeek (Bro), Snort and OSINT
Просмотров 6284 года назад
Introduction to network forensics using Zeek (Bro), Snort and OSINT #networkforensics #snort #zeek #bro
Where to find malicious traffic and file examples for malware exercises
Просмотров 1514 года назад
In this video, we'll investigate a malicious file resource called malware-traffic-analysis.net
How to analyze malicious office documents (dumping macro and extracting IOCs) #malware
Просмотров 1984 года назад
In this video, we'll dump malicious macro parts from office document and also extract IOCs (indicators of compromise) from office documents. #malware #triage
this tool is a key tool a for analysts or just only to know someone.?
رائع
Fantastic video! Thank you so much!
Great video ! I would like to see more zeek videos
Thanks for the feedback. I've plans for more videos on Zeek!
why i cant find this software? can you provide me the link.
Looks like they've renamed the tool to Zui: www.brimdata.io/download/
thanks for this demo, very useful
You are welcome!