Completed
Impersonate Victim
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Threat Hunting - Using MITRE ATT&CK Against Carbanak Malware
Automatically move to the next video in the Classroom when playback concludes
- 1 Threat Hunting: Using MITRE ATT&CK against Carbanak malware
- 2 Threat Hunting - Why?
- 3 Intelligence - Threat Hunting Model
- 4 Situational - Threat Hunting Model
- 5 Hypothesis - Threat Hunting Model
- 6 MITRE ATT&CK v11.0 Tactics
- 7 TTP Example
- 8 Attack working
- 9 MITRE Initial Access
- 10 Phishing mitigation
- 11 MITRE Execution
- 12 Command & Control Execution Exfiltration
- 13 Deploy Toolkit (Defense Evasion)
- 14 Privilege Escalation
- 15 Lateral Movement
- 16 Discovery of privileged user
- 17 Persistence on privileged account
- 18 Covert access and victim profile
- 19 Impersonate Victim