Intrusion Analysis and Threat Hunting with Open Source Tools
• Video
Publisher
Software Engineering Institute
Topic or Tag
Watch
Abstract
In today’s threat landscape, sophisticated adversaries have routinely demonstrated the ability to compromise enterprise networks and remain hidden for extended periods of time. In Intrusion Analysis and Threat Hunting with Open Source Tools, you will learn how to dig deep into network traffic to identify key evidence that a compromise has occurred, learn how to deal with new forms of attack, and develop the skills necessary to proactively search for evidence of new breaches. We will explore key phases of adversary tactics and techniques - from delivery mechanisms to post-infection traffic - to get hands-on analysis experience. Open-source tools such as Suricata and Moloch will be utilized to generate data, perform exhaustive traffic analysis, and develop comprehensive threat hunting strategies. By the end of this workshop, you will have the knowledge and skills necessary to discover new threats in your network. To help you prepare for this workshop, we recommend that you are familiar with the basics of network security monitoring, IDS/IPS systems and Linux environments. Familiarization with IDS rules is recommended, but not required. We also recommend the following readings: MITRE Attack Design and Philosophy by Blake Strom, et al https://www.mitre.org/sites/default/f... The Diamond Model of Intrusion Analysis by Sergio Caltagirone, et al http://www.activeresponse.org/wp-cont... Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains by Eric Hutchins, et al https://www.lockheedmartin.com/conten...
Subscribe
Part of a Collection
FloCon 2021 Presentations and courses
This content was created for a conference series or symposium and does not necessarily reflect the positions and views of the Software Engineering Institute.