Network Forensic Analysis in an Encrypted World

Network Forensic Analysis in an Encrypted World

BSidesLV via YouTube Direct link

What this Means for Network Defenders

5 of 18

5 of 18

What this Means for Network Defenders

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Network Forensic Analysis in an Encrypted World

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Justin Warner (@sixdub)
  3. 3 NSM Quadrant
  4. 4 Encryption's Impact on the Quadrant
  5. 5 What this Means for Network Defenders
  6. 6 Encrypted Traffic Metadata
  7. 7 Leverage Encryption as an Advantage to Shift Balance of Power to Defenders
  8. 8 Hunting Primer
  9. 9 What is Normal?
  10. 10 Commonality - Asset / Request Distributions
  11. 11 Send/Recy Ratios by Server Name
  12. 12 Let's Encrypt Things!
  13. 13 Different Levels of Certificates
  14. 14 Changing The Mindset
  15. 15 Who would abuse free certificates?
  16. 16 Basic Detection → Forensics Process
  17. 17 So... Encryption Isn't the End of the World
  18. 18 Encrypted NSM Security Model (ECNSMM)

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.