Investigating a Hack with Splunk and the Cyber Kill Chain Part 2
In this four part series of videos we examine how you can use Splunk and the Lockheed Martin Kill Chain to investigate a data breach.
In Part 2 we try to uncover the reconnaissance our adversary carried out in this data breach using Splunk.
Links
Introduction to the Splunk Security Dataset
https://www.splunk.com/blog/2018/05/03/introducing-the-security-datasets-project.html#
Splunk Security Datasets on GitHub
https://github.com/splunk/securitydatasets
Boss of the SOC Team Competition Scoring Application
https://www.splunk.com/blog/2018/05/10/boss-of-the-soc-scoring-server-questions-and-answers-and-dataset-open-sourced-and-ready-for-download.html
Splunk Online Live Access to the Splunk Security Project
https://live.splunk.com/splunk-security-dataset-project
Видео Investigating a Hack with Splunk and the Cyber Kill Chain Part 2 канала ShaneInSweden
In Part 2 we try to uncover the reconnaissance our adversary carried out in this data breach using Splunk.
Links
Introduction to the Splunk Security Dataset
https://www.splunk.com/blog/2018/05/03/introducing-the-security-datasets-project.html#
Splunk Security Datasets on GitHub
https://github.com/splunk/securitydatasets
Boss of the SOC Team Competition Scoring Application
https://www.splunk.com/blog/2018/05/10/boss-of-the-soc-scoring-server-questions-and-answers-and-dataset-open-sourced-and-ready-for-download.html
Splunk Online Live Access to the Splunk Security Project
https://live.splunk.com/splunk-security-dataset-project
Видео Investigating a Hack with Splunk and the Cyber Kill Chain Part 2 канала ShaneInSweden
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Building an Application Security Program - Module 101 - Why App Sec? Part 2Play by Play: Building an IDS with C# - Part 4 First Unit TestPlay by Play: Building an IDS with C# - Part 8 Network Capture With SharpPCap IIPlay by Play: Building an IDS with C# - Part 12 Host Scan DetectorBuilding a World of Tanks MVC Web Application with C# - Part 4 Building the WebsiteBuilding a World of Tanks MVC Web Application with C# - Part 3 Getting a valid WoT Application IdBuilding an Application Security Program - Module 101 - Why App Sec? Part 1Splunk Security Datasets Project - Bonus Part 5Building a HTTP Response Headers security control in C# Part 2The View - Underneath the Lights - Live from Stockholm 2016Investigating a Hack with Splunk and the Cyber Kill Chain Part 4Play by Play: Building an IDS with C# - Part 6 Handling intrusion detection rulesBuilding a HTTP Response Headers security control in C# Part 3OWASP Top 10 Threats 2017 in .Net C#: 8.2 Insecure Deserialization Part 3Play by Play: Building an IDS with C# - Part 9 Reporting Part IOWASP Top 10 Threats 2017 in .Net C#: 8.1 Insecure Deserialization Part 1OWASP Top 10 Threats 2017 in .Net C#: 8.2 Insecure Deserialization Part 2 (Full Version)Play by Play: Building an IDS with C# - Part 13 Port Scan DetectorPlay by Play: Building an IDS with C# - Part 3 Visual Studio setupBuilding a HTTP Response Headers security control in C# Part 1Building an Application Security Program - Module 103 - App Sec Activities