Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Visibility Beyond Perimeters - Detecting C2 at Time of Execution

BruCON Security Conference via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a groundbreaking method for detecting malicious network intrusions in this 48-minute conference talk from BruCON Security Conference. Delve into the limitations of current detection techniques and discover a new approach that provides near-real-time alerting without relying on endpoint client software. Learn how this innovative technology leverages network IOCs beyond existing XDR platforms, offering consistent detection across all OS versions and vendors. Gain insights into detecting supply-chain attacks and partner vulnerabilities. Examine real-world examples from the CTI League's efforts to protect hospitals during the 2020 pandemic. Understand how this method can augment existing EDR solutions, potentially giving organizations extra time to prevent data breaches. Topics covered include the F51 vulnerability, Gray Noise, forensics, DNS IOCs, ransomware, trojans, and techniques for detecting various types of malware and botnets.

Syllabus

Intro
Why is this important
Showdown
F51 vulnerability
Who found F51
What we found
How we did this
Gray Noise
Forensics
Showdown Hunting
Pro Tips
Ingram Micro
DNS
DNS IOCs
Ransomware
trojans
CTI League
Answering malware
Detecting malware
Detecting botnets
Conclusion
QA

Taught by

BruCON Security Conference

Reviews

Start your review of Visibility Beyond Perimeters - Detecting C2 at Time of Execution

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.