У нас вы можете посмотреть бесплатно WORKSHOP: Pivoting Across Infrastructure to Detect Unknown Threats или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Adversary infrastructure is often hidden or inactive - evading detection by most CTI tools - until it becomes active in an attack. REGISTER FOR NEXT WORKSHOP: https://info.silentpush.com/platform-... This is a condensed recording of a previous interactive workshop designed for those new to threat hunting on the Silent Push platform. Full-length workshop videos are available on request at info@silentpush.com. In this session, attendees learned how to uncover the 98% of malicious infrastructure that typically goes undetected. We demonstrated how pivoting - linking data points like domains, IPs, and certificates - can reveal an attacker’s hidden network. Real-time examples showcased the power of pivots within the Silent Push free Community Edition, empowering participants to spot threats before they strike. Originally held on: 24 June 2025 00:00 - 04:22 Total View 04:23 - 06:14 Building a Web Scanner Query 06:15 - 08:09 Favicon and Certificate Pivot 08:10 - 10:31 Live Scan Pivot 10:32 - 11:12 Script Hash Value (SHV) Pivot 11:13 - 11:54 Domain Pivot 11:55 - 12:55 Javascript File Pivot 12:56 - 14:11 Web Resource Scan Pivot 14:12 - 14:44 Thanks for watching