Security Onion Training 101: Part 2 - Intrusion Detection and Network Analysis
Please check out my Udemy courses! Coupon code applied to the following links....
https://www.udemy.com/hands-on-penetration-testing-labs-30/?couponCode=NINE99
https://www.udemy.com/hands-on-penetration-testing-labs-20/?couponCode=NINE99
https://www.udemy.com/kali-linux-web-app-pentesting-labs/?couponCode=NINE99
https://www.udemy.com/kali-linux-hands-on-penetration-testing-labs/?couponCode=NINE99
https://www.udemy.com/network-security-analysis-using-wireshark-snort-and-so/?couponCode=NINE99
https://www.udemy.com/snort-intrusion-detection-rule-writing-and-pcap-analysis/?couponCode=NINE99
Description:
This video will cover how to prompt alerts within Security Onion by performing remote attacks against a Ubuntu server (Metasploitable) using Armitage, which is a GUI front end for Metasploit within Kali Linux. Subsequently, there will be a demonstration of how to interpret alerts and analyze the underlying network traffic using Wireshark.
It's notable to mention that no real Trojan infection occurred. This was merely a demonstration of how analysis and reporting of potentially malicious traffic is performed.
The following are websites which are pertinent to this video:
https://sourceforge.net/projects/metasploitable/
https://github.com/Security-Onion-Solutions/security-onion/blob/master/Verify_ISO.md
https://www.kali.org/downloads/
Видео Security Onion Training 101: Part 2 - Intrusion Detection and Network Analysis канала Jesse K
https://www.udemy.com/hands-on-penetration-testing-labs-30/?couponCode=NINE99
https://www.udemy.com/hands-on-penetration-testing-labs-20/?couponCode=NINE99
https://www.udemy.com/kali-linux-web-app-pentesting-labs/?couponCode=NINE99
https://www.udemy.com/kali-linux-hands-on-penetration-testing-labs/?couponCode=NINE99
https://www.udemy.com/network-security-analysis-using-wireshark-snort-and-so/?couponCode=NINE99
https://www.udemy.com/snort-intrusion-detection-rule-writing-and-pcap-analysis/?couponCode=NINE99
Description:
This video will cover how to prompt alerts within Security Onion by performing remote attacks against a Ubuntu server (Metasploitable) using Armitage, which is a GUI front end for Metasploit within Kali Linux. Subsequently, there will be a demonstration of how to interpret alerts and analyze the underlying network traffic using Wireshark.
It's notable to mention that no real Trojan infection occurred. This was merely a demonstration of how analysis and reporting of potentially malicious traffic is performed.
The following are websites which are pertinent to this video:
https://sourceforge.net/projects/metasploitable/
https://github.com/Security-Onion-Solutions/security-onion/blob/master/Verify_ISO.md
https://www.kali.org/downloads/
Видео Security Onion Training 101: Part 2 - Intrusion Detection and Network Analysis канала Jesse K
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Security Onion Lab: How to Install/Configure/Troubleshoot *NEW*](https://i.ytimg.com/vi/jRoQUVY-2Ic/default.jpg)
![Security Onion with Elasticsearch, Logstash, and Kibana (ELK)](https://i.ytimg.com/vi/cUP_ZRn5rro/default.jpg)
![CompTIA Security+ Lab #17 - IDS Alert Analysis using SGUIL via Security Onion](https://i.ytimg.com/vi/zbC2_TVmF1U/default.jpg)
![SIEM Setup- Splunk & Security Onion Install](https://i.ytimg.com/vi/odg_B8MuGmE/default.jpg)
![Cyberops Skills Assessment](https://i.ytimg.com/vi/-lNS3ECgZh0/default.jpg)
![Wireshark Tutorial for Beginners](https://i.ytimg.com/vi/TkCSr30UojM/default.jpg)
![Wireshark Advanced Malware Traffic Analysis](https://i.ytimg.com/vi/dk39uVyrS_o/default.jpg)
![DNS Tunneling Identification and Defense](https://i.ytimg.com/vi/CaFo83TlpPM/default.jpg)
![SOC Analyst (Cybersecurity) Interview Questions and Answers - SOC Processes](https://i.ytimg.com/vi/0POWOu4iUrg/default.jpg)
![Ping Scan Detection - ICMP & Rules Set-Up - IDS SNORT in Ubuntu OS - Intrusion Detection System](https://i.ytimg.com/vi/av9kzh5Y-70/default.jpg)
![Angler EK Analysis with SecurityOnion](https://i.ytimg.com/vi/1qUF3Bv7dIQ/default.jpg)
![Security Onion Production Master Server / Slave Sensor Deployment](https://i.ytimg.com/vi/4GN34Ge-UDQ/default.jpg)
![Intrusion Detection System OSSEC | One Stop Cyber Security](https://i.ytimg.com/vi/MNp_2a-yB_w/default.jpg)
![Mastering Wireshark 2 : DNS Analysis](https://i.ytimg.com/vi/pGyH67K41ro/default.jpg)
![What Are Exploit Kits?](https://i.ytimg.com/vi/TIFrbGyaMBE/default.jpg)
![SOC Analyst 1 - 6: Network Analysis (Suricata: IDS Rules)](https://i.ytimg.com/vi/7nXd1pbaj8w/default.jpg)
![Vulnserver Buffer Overflow Exploit Development with Kali Linux](https://i.ytimg.com/vi/qjWs___hQcE/default.jpg)
![Pentesting with Evil WinRM - Practical Exploitation [Cyber Security Education]](https://i.ytimg.com/vi/tVgJ-9FJKxE/default.jpg)
![Network Security Monitoring: Five Use Cases to Push the Limit](https://i.ytimg.com/vi/jc-ZefSQ9LA/default.jpg)
![How To Track Logon Sessions with Windows Security Log](https://i.ytimg.com/vi/8B04-RXMtWY/default.jpg)