У нас вы можете посмотреть бесплатно Exploring BeaKer w/ Chris Brenton (1-Hour) или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Want to level up your threat-hunting knowledge? Take our FREE, hands-on threat hunt training course: https://www.activecountermeasures.com... 00:00 - PreShow Banter™ – Listen Only Mode 4:27 - Exploring BeaKer 7:35 - A Common Problem 9:59 - What Beaker Does 11:42 - Example of Beaker at Work 15:32 - Beaker is What? 16:45 - Sysmon ( https://docs.microsoft.com/en-us/sysi... ) 17:39 - Event ID 3 Example 19:19 - It's All Been Done Before 23:45 - Focus On a Quick Reference Tool 25:37 - Beaker Dashboard 33:20 - What BeaKer Sees 48:21 - Questions? Video Description: How many times have you been reviewing your firewall logs, NIDS alerts, packet decodes, or similar, and wished you had an easy way to see which application created the network connection you are analyzing? Yup, us too, that's why we created BeaKer. "BeaKer" is our latest open-source project that connects together Sysmon, Winlogbeat and an ELK stack so that you can quickly and easily run down which applications are communicating with other systems across the network. It acts as a bridge between your network data and your host logs. So imagine I'm reviewing my outbound firewall logs and I notice a connection pattern that looks like command and control (C2) traffic. With BeaKer, I can quickly pivot to see which application is creating those connections. If I find something suspicious, I can rapidly expand the view to include all host and user data within the defined time range. This way I can quickly obtain the full context of the attack. Check out BeaKer: https://github.com/activecm/BeaKer Active Countermeasures Socials Twitter: / activecmeasures LinkedIn: / active-countermeasures Discord: / discord Our Threat Hunting Tool ~ AC-Hunter (Formally AI-Hunter) Features - https://www.activecountermeasures.com... Interactive Demo Space - https://www.activecountermeasures.com... Active Countermeasures Open-Source Tools https://www.activecountermeasures.com... Educational Threat Hunting Content FREE 6-Hour Threat Hunt Training: https://www.activecountermeasures.com... Active Countermeasures Blog: https://www.activecountermeasures.com... Active Countermeasures YouTube: / activecountermeasures Learn Threat Hunting Skills from Antisyphon Training Entry-Level (Pay-What-You-Can): https://www.antisyphontraining.com/pa... Advanced: https://www.antisyphontraining.com/ad... Active Countermeasures Shirts https://spearphish-general-store.mysh... Our Tribe Black Hills Infosec: https://www.blackhillsinfosec.com/ Wild West Hackin' Fest: https://wildwesthackinfest.com/ Antisyphon Training: https://www.antisyphontraining.com/