Hunting for Post-Exploitation Stage Attacks with Elastic Stack and the MITRE ATT&CK Framework

แชร์
ฝัง
  • เผยแพร่เมื่อ 20 ก.ค. 2024
  • SANS Summit schedule: www.sans.org/u/DuS
    The Most Dangerous Game: Hunting for Post-Exploitation Stage Attacks with Elastic Stack and the MITRE ATT&CK Framework
    John Hubbard, SOC Manager, GlaxoSmithKline; Certified Instructor, SANS Institute
    Modern cyber defense requires the mindset of “assume breach,” but with so much data generated by our networks and endpoints, how can we collect the information needed to identify attacks in an affordable way, let alone sort through it all? This talk will discuss the unique challenges of finding post-exploitation activity in our mountains of data and walk through using the open source Elastic Stack to identify the techniques enumerated in MITRE’s ATT&CK framework. Attendees will be given an overview of how to leverage the ATT&CK body of knowledge, options for data collection, and suggested rules and dashboards that specifically target finding post-exploitation activity. The goal of this talk is to arm defenders with industry-validated attack knowledge, and demonstrate how late-stage compromises can be identified and stopped before significant damage is caused.

ความคิดเห็น • 8

  • @tpai302
    @tpai302 3 ปีที่แล้ว +3

    It's amazing how much open source tools exist and orgs don't use them. I believe it's mostly because they don't know they exist, and there are some that know but are too lazy to configure and invest the time.
    Great presentation!

  • @TOMmy-lp3wr
    @TOMmy-lp3wr 4 ปีที่แล้ว +1

    Very informative. Thank you.

  • @JarodM
    @JarodM 5 ปีที่แล้ว

    Excellent presentation~

  • @malcolm2914
    @malcolm2914 4 ปีที่แล้ว

    Very Informational! Great Content!

  • @sachinlawande2091
    @sachinlawande2091 5 ปีที่แล้ว

    Wow, with a presentation.

  • @dbencomo
    @dbencomo 4 ปีที่แล้ว +1

    Excellent presentation. Are the slides available? Where?

  • @Hybrid_Netowrks
    @Hybrid_Netowrks 3 ปีที่แล้ว

    Okay so its the initial evolution of securityOnion