Network Forensic Analysis in an Encrypted World

Network Forensic Analysis in an Encrypted World

BSidesLV via YouTube Direct link

Changing The Mindset

14 of 18

14 of 18

Changing The Mindset

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Network Forensic Analysis in an Encrypted World

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Justin Warner (@sixdub)
  3. 3 NSM Quadrant
  4. 4 Encryption's Impact on the Quadrant
  5. 5 What this Means for Network Defenders
  6. 6 Encrypted Traffic Metadata
  7. 7 Leverage Encryption as an Advantage to Shift Balance of Power to Defenders
  8. 8 Hunting Primer
  9. 9 What is Normal?
  10. 10 Commonality - Asset / Request Distributions
  11. 11 Send/Recy Ratios by Server Name
  12. 12 Let's Encrypt Things!
  13. 13 Different Levels of Certificates
  14. 14 Changing The Mindset
  15. 15 Who would abuse free certificates?
  16. 16 Basic Detection → Forensics Process
  17. 17 So... Encryption Isn't the End of the World
  18. 18 Encrypted NSM Security Model (ECNSMM)

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.