Live Incident Response with Velociraptor

แชร์
ฝัง
  • เผยแพร่เมื่อ 17 มิ.ย. 2022
  • Recon InfoSec CTO, Eric Capuano, performs a hands-on demonstration of a live incident response against a compromised environment using nothing but the free and open source Velociraptor agent. Gain exposure to this incredibly powerful tool and many of its most common use-cases for IR, including use of notebooks for analysis and enrichment.
    Notebook examples can be found here: gist.github.com/ecapuano/daee...
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 31

  • @velocidexenterprises8702
    @velocidexenterprises8702 2 ปีที่แล้ว +36

    Really excellent talk with so much information. Great to see Velociraptor wielded by such a skillful defender! A must watch presentation for any Blue Teamer or defender out there!

  • @gerarddunphy
    @gerarddunphy 3 หลายเดือนก่อน

    Incredible demo showing how Velociraptor truly takes IR capabilities to a whole other level! This is a game changer! The only thing missing was did the threat actor actually exfil those plans to the death star :) Thank you for this great insight! I have a new lab to build post haste!

  • @rpt3066
    @rpt3066 ปีที่แล้ว +2

    Dont know what more motivation is needed to use this awesome tool - for FREE! Thank you Eric C for sharing invaluable experience for FREE & Mike C for sharing this tech for FREE 👑🙌

  • @edwardwhite8253
    @edwardwhite8253 ปีที่แล้ว +1

    Absolutely incredible and in-depth demo! The pacing, the contents are all great! Bravo Eric!

  • @KenPryor
    @KenPryor ปีที่แล้ว

    This was amazing. I just started learning about Velociraptor recently and have much to learn. This video was extremely helpful.

  • @domiflichi
    @domiflichi ปีที่แล้ว

    Wow! Incredible video, thank you!

  • @getoutmore
    @getoutmore ปีที่แล้ว +1

    This was so awesome!!! I could have watched this for hours. Motivated me so much to get my hands on this. Do you have more stuff Like this? Im hungry to learn! Thanks you for the Video

  • @Impact_Creativity
    @Impact_Creativity ปีที่แล้ว

    what an amazing video! thanks for all the info, really usefull!

  • @dananderson6992
    @dananderson6992 2 ปีที่แล้ว +1

    Well done live hunt. thanks for sharing.

  • @rolyperez8695
    @rolyperez8695 ปีที่แล้ว

    I heard about this at the NCFI and started using it. Cederpelta was the one i used to use. Greetings from LaredoTx.

  • @WarThunderista
    @WarThunderista 3 หลายเดือนก่อน

    Amazing stuff :D

  • @mitchimpey1726
    @mitchimpey1726 2 ปีที่แล้ว +1

    Great Demo Eric. Excellent example and a great presentation. Thanks, appreciated !

    • @EricCapuano
      @EricCapuano 2 ปีที่แล้ว

      Thank you! Glad you enjoyed it.

  • @shamshoque2546
    @shamshoque2546 2 หลายเดือนก่อน

    Really great structured information. Thanks. How to integrate hyabusa in hunt profile????

  • @frzen
    @frzen ปีที่แล้ว

    Great talk thanks

  • @MuhammadImran-xu4fw
    @MuhammadImran-xu4fw ปีที่แล้ว +1

    Awesome, impressed :)
    How about if the adversary does the cleanup while doing lateral movement?

  • @PrinterJamOnToast
    @PrinterJamOnToast 2 ปีที่แล้ว +1

    This is so cool, I hope to work for a company that uses this some day.

    • @TurboRetard
      @TurboRetard ปีที่แล้ว

      Im deploying it where I work, glad the sysadmin is open minded to give me free reign on cyber security

  • @holeraholera
    @holeraholera 10 หลายเดือนก่อน

    Great stuff! Thank you. Have you thought about releasing the collected data so that we can play with it in our own velociraptor server?

  • @civicnox
    @civicnox ปีที่แล้ว

    Good video

  • @sirisiri2048
    @sirisiri2048 ปีที่แล้ว

    This is awesome
    Really in-depth analysis
    Just had one question where can I find this data or the malware ? Is their a repository you have used for this ?

    • @EricCapuano
      @EricCapuano ปีที่แล้ว

      Sadly this was run inside of our live training range so the data is not available otherwise. I’ll see about trying to capture and release the data in the future!

  • @aliakbar307
    @aliakbar307 8 หลายเดือนก่อน

    Hi, thanks for the great video. I have a question.
    How the shellcode is decrypted and which component will decrypt it?

  • @user-zi9mg6mf5v
    @user-zi9mg6mf5v ปีที่แล้ว

    How did you prepared the demo environment with more than 60 workstations? is that a simulator tool? awsome talk by the way and thank you!

    • @EricCapuano
      @EricCapuano ปีที่แล้ว

      I used a large virtual environment we've built for other trainings like OpenSOC & our Network Defense Range.

  • @clomok
    @clomok 2 ปีที่แล้ว +1

    Wow, such a cool talk. Does velociraptor have to be implemented with a single network? Is there a way to have velociraptor clients from different networks communicate with a single server?

    • @EricCapuano
      @EricCapuano 2 ปีที่แล้ว +1

      Absolutely. The server doesn’t know/care what network the agent checks in from. You can host the server in the cloud and have hosts on many different networks checking in.

    • @clomok
      @clomok 2 ปีที่แล้ว

      @@EricCapuano that sounds like a wonderful setup.
      Can you imagine a situation where velociraptor replaces a MSP's end point detection and aggregates all clients to a universal dashboard?

  • @EIDEID99
    @EIDEID99 2 ปีที่แล้ว

    wait @23:39 , if a user login , will 4624 stored in the AD on in his/her PC.

    • @EricCapuano
      @EricCapuano 2 ปีที่แล้ว +1

      A 4624 (successful logon) gets generated on the system being logged onto to... The authentication event (4768) shows up on the domain controller.

  • @ChristopherReevesNZ
    @ChristopherReevesNZ ปีที่แล้ว +2

    Issues that I see with this:
    1. This seems to rely on AD GPO (or some sort of deployment tool), these days people are also using Macs and *inux so you might not get all the coverage. Secondly on this point is if GPO is disabled at the AD / workstation level then this too is rendered useless.
    2. I personally don't know of one analyst that knows VQL let alone SQL
    3. The UI is 🤮
    4. Tools like Crowdstrike kinda do this using ML/AI without all the manual stuff
    5. Dropping session seems quite POCCY to me
    6. A lot of this stuff can be done using windows remote management in a scripted way