SANS Webcast - YARA - Effectively using and generating rules
More about the SANS SEC599: Defensible Advanced Adversaries course: www.sans.org/SEC599
Presented by: Erik Van Buggenhout, Lead Author, SEC599: Defeating Advanced Adversaries
YARA rules are becoming one of the de facto standards in detection rules. During this interesting webcast, we will explain the different use cases of YARA, but also focus on how YARA rules can be effectively used and developed in your own environment. We will demonstrate tools that can help facilitate YARA rule development. The content will be covered by Erik Van Buggenhout (SANS Instructor) & Didier Stevens (SANS ISC Handler & malware expert). We cover YARA rules in more detail in the course SEC599: Defeating Advanced Adversaries: Purple Team Tactics & Kill Chain Defenses.
Видео SANS Webcast - YARA - Effectively using and generating rules канала SANS Institute
Presented by: Erik Van Buggenhout, Lead Author, SEC599: Defeating Advanced Adversaries
YARA rules are becoming one of the de facto standards in detection rules. During this interesting webcast, we will explain the different use cases of YARA, but also focus on how YARA rules can be effectively used and developed in your own environment. We will demonstrate tools that can help facilitate YARA rule development. The content will be covered by Erik Van Buggenhout (SANS Instructor) & Didier Stevens (SANS ISC Handler & malware expert). We cover YARA rules in more detail in the course SEC599: Defeating Advanced Adversaries: Purple Team Tactics & Kill Chain Defenses.
Видео SANS Webcast - YARA - Effectively using and generating rules канала SANS Institute
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Moving Past Just Googling It: Harvesting and Using OSINT | SANS@MIC Talk](https://i.ytimg.com/vi/Vuthnc5UUuA/default.jpg)
![TCP Fundamentals Part 1 - Wireshark Talks at Sharkfest](https://i.ytimg.com/vi/xdQ9sgpkrX8/default.jpg)
![How to Present Cyber Security Risk to Senior Leadership | SANS Webcast](https://i.ytimg.com/vi/_uCmvfOhR_E/default.jpg)
![Securing Your Endpoints with Carbon Black A SANS Review of the CB Predictive Security Cloud Platform](https://i.ytimg.com/vi/2yd7qjO1ovI/default.jpg)
![Ochko123 - How the Feds Caught Russian Mega-Carder Roman Seleznev](https://i.ytimg.com/vi/6Chp12sEnWk/default.jpg)
![Finding Evil with YARA](https://i.ytimg.com/vi/mQ-mqxOfopk/default.jpg)
![Exploring Docker [1] - Getting Started](https://i.ytimg.com/vi/Kyx2PsuwomE/default.jpg)
![How to work in ways that will make your boss take notice! | SANS Webcast](https://i.ytimg.com/vi/i1wPvfC0VqM/default.jpg)
![Resource Smart Malware Detection with YARA & osquery - Julian Wayte](https://i.ytimg.com/vi/yT00ksfLkKs/default.jpg)
![How Threats Are Slipping In the Back Door - SANS ICS Security Summit 2017](https://i.ytimg.com/vi/qg-zK2zv4ng/default.jpg)
![Threat Hunting via DNS with Eric Conrad - SANS Blue Team Summit 2020](https://i.ytimg.com/vi/RdcCjDS0s6s/default.jpg)
![Windows logging, Sysmon, and ELK](https://i.ytimg.com/vi/FeCSJBKYFBQ/default.jpg)
![SANS Webcast - Consuming OSINT: Watching You Eat, Drink, and Sleep](https://i.ytimg.com/vi/sosFJQ4IShs/default.jpg)
![Cybersecurity is Like Ice Cream. There Are a Whole Lot of Flavors](https://i.ytimg.com/vi/D6CxrdzC42k/default.jpg)
![An Introduction to Threat Hunting With Zeek (Bro)](https://i.ytimg.com/vi/R5mnIvjQn-g/default.jpg)
![Tracking Threat Actors through YARA Rules and Virus Total - SANS DFIR Summit 2016](https://i.ytimg.com/vi/DdkLY99HgAA/default.jpg)
![Regular Expressions (Regex) Tutorial: How to Match Any Pattern of Text](https://i.ytimg.com/vi/sa-TUpSx1JA/default.jpg)
![SANS DFIR WebCast - Super Timeline Analysis](https://i.ytimg.com/vi/C4jNfXZ90fw/default.jpg)
![BSides CT 2020 - Yara For Hunting Malwares - Lakshya Dubey](https://i.ytimg.com/vi/_tgPr2sP5CI/default.jpg)
![Manipulating Objects in Microsoft PowerShell - Video 2](https://i.ytimg.com/vi/f9xPJXslVWE/default.jpg)