Загрузка страницы

Windows Ransomware Detection with Splunk (2 of 6) – Unusual Traffic – Tor, SMB, DNS, HTTP

In this 6-part series, Splunk’s James Brodsky walks through real-world examples of Windows ransomware detection techniques, using data from Vulnerability and Patch Management, Network Traffic, Windows Registry, Windows Events, and Windows Sysmon. This video covers how to network traffic logs to implement ransomware detection techniques such as communications from unusual processes, unwanted SMB communications from endpoints, network connections to TCP 445 or 139, domain PTR queries not in the Alexa 1M, and even detection before encryption (e.g. process running in user space to initiate download of encryptor code).

For more information:

Splunk Security Essentials for Ransomware: https://splunkbase.splunk.com/app/3593/

Splunk Security Essentials: https://splunkbase.splunk.com/app/3435/

Splunk Online Demo Experience (Try Ransomware techniques in a “safe”, guided sandbox with real “threats”): https://www.splunk.com/en_us/form/security-investigation-online-experience-endpoint.html

Видео Windows Ransomware Detection with Splunk (2 of 6) – Unusual Traffic – Tor, SMB, DNS, HTTP канала Splunk
Показать
Комментарии отсутствуют
Введите заголовок:

Введите адрес ссылки:

Введите адрес видео с YouTube:

Зарегистрируйтесь или войдите с
Информация о видео
14 сентября 2017 г. 3:33:36
00:17:36
Яндекс.Метрика