April 13

Webinar Takeaway: Cyber Threat Hunting Level 1

0  comments

file

My key takeaways

  • the juicy stuff is the traffic leaving the network: is there a business need for it?
  • Bro / Zeek : Bro old, Zeek new, almost same
  • Figuring out beacons best over long period of times, eg 24h
  • almost all c2 beacons are encrypted, use meta information to detect them
  • today heartbeats without jitter timing: 50% chance of a false positive
  • ==RITA does not install on Ubuntu 20.04==

Env

additional links


Tags

threathunting


You may also like

Webinar takeaway – Applying The Threat Hunter’s Runbook

Webinar takeaway – Applying The Threat Hunter’s Runbook

Webinar takeaway – The Ins and Outs of RITA

Webinar takeaway – The Ins and Outs of RITA
Leave a Reply

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit markiert.

{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}