Real-Time Threat Hunting - SANS Threat Hunting & Incident Response Summit 2017

Поделиться
HTML-код
  • Опубликовано: 3 окт 2024

Комментарии • 9

  • @prince10000able
    @prince10000able 7 лет назад +1

    Awesome tool and talk Tim 👍 Lots to learn

  • @Rafsangani
    @Rafsangani 6 лет назад

    I addition to collecting traces on one side, you can do the search live for anything coming into the network by using tshark and directing the trace to your python scripts to capture what you are looking for and display it instantly. Or send the output to another short file.
    Use network tapping device to collect/monitor network instead of running wireshark on the server itself.

    • @hitnahsin
      @hitnahsin 4 года назад

      i am not sure if we can run Wireshark on big environment.I think this is suitable for a small organization.A big organization have different security zones and its tough for one to actually know where to have a tap.You have taps on IDS/IPS and now with security products like Crowdstrike you are able to get memory forensics and traffic path on a single dashboard....as we progress looks like eventually the programmers will be looking at a console which shows the traffic of their system.The lines are fast disappearing.

  • @davelundie2866
    @davelundie2866 6 лет назад

    Great talk

  • @Anon-tj7qb
    @Anon-tj7qb 6 лет назад

    Nice to see it used without the buzz

  • @anshuman.deshmukh
    @anshuman.deshmukh 6 лет назад

    It's really awesome for the malware hunters

  • @kareenyirenkyi6720
    @kareenyirenkyi6720 4 года назад

    Thanks 😘

  • @sasikumarreddykummetha2299
    @sasikumarreddykummetha2299 5 лет назад +1

    hii sir
    how to learn threat hunting course.
    please tell me sir any websites are any documents .
    thanks
    sasikumar