Weaponizing the Deep Web | SANS OSINT Summit 2020
There’s a lot of talk about data breaches but not much is discussed about where the data ends up and how it can be used for good. In this low-key talk, we’ll discuss where breach data ends up, how you can find copies of it, and most importantly, how you can use it to further your security goals. We’ll discuss how it can benefit blue teams/threat intel shops, pen testers, OSINT researchers and even DFIR practitioners.
Matt Edmondson @matt0177, Certified Instructor, SANS Institute
View upcoming Summits: http://www.sans.org/u/DuS
Видео Weaponizing the Deep Web | SANS OSINT Summit 2020 канала SANS Institute
Matt Edmondson @matt0177, Certified Instructor, SANS Institute
View upcoming Summits: http://www.sans.org/u/DuS
Видео Weaponizing the Deep Web | SANS OSINT Summit 2020 канала SANS Institute
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Moving Past Just Googling It: Harvesting and Using OSINT | SANS@MIC TalkReal-Time OSINT: Investigating Events as They Happen | SANS OSINT Summit 2020Threat Hunting via DNS with Eric Conrad - SANS Blue Team Summit 202020200531 The OSINT Curious WebcastHow the mysterious dark net is going mainstream | Jamie BartlettCan People Hack Nuclear Plants?How Threats Are Slipping In the Back Door - SANS ICS Security Summit 2017Open Source Intelligence 101Threat Hunting via Sysmon - SANS Blue Team SummitUnconventional Logging and Detection - SANS Tactical Detection Summit 2018Moving Past Just Googling It: Harvesting and Using OSINT | SANS@MIC TalkIntroduction to Reverse Engineering for Penetration Testers – SANS Pen Test HackFest Summit 2017Maltego for Cryptocurrency Investigations519 Open Source Intelligence What I learned by being an OSINT creeper Josh Huff20200614 The OSINT Curious WebcastNext-Level App Hacking: Threat Modeling for Better AttacksClosed For Business: Taking Down Darknet Markets - John ShierOSINT Live Training by Authentic8 28 APR: Dark Web ResearchDefending Critical InfrastructureTales from the Network Threat Hunting Trenches & AI Hunter Demo