Lets gooo! I've always had a soft spot for threat hunting. I just didn't realize there was a term for it until recently 🤣 I love messing with AC Hunter/RITA. I just took the Active Defense & Cyber Deception course last week. I am in the Zoom webinar now for the SOC Core Skills class now. John Strand is an amazing teacher as well!
BHIS and Antisyphon are killing it in the training area. I just to the Antisyphon SOC Core Skills and it is upping my game and making me more confident as a New to SOC analyst. Thanks for covering this John I look forwarded to doing a lab with this. Keep it up!
As a product designer in cyber, the UI makes my soul hurt. It looks like work I did back in 2007, and although it’s got that “coooool” factor, there is a tremendous amount of non-data pixels which impacts usability, accessibility, and cognitive load.
Yep, the UI is horrendous, it looks like some old Flash stuff or cheap Hollywood. Ironically, RITA, which is just the engine and html report files is better.
@@Ati27 that’s hilarious because it reminds me of old flash work of mine from the days before everyone knew flash was about as secure as a tinfoil boat.
I have a question; we are considering setting up AC-Hunter. AC hunter docs says that the preferred systems are ubuntu 16, 18, 20.04. For 20.04, support is going to be ended in April 2025. I tried installing it on 24.04 but the installation was failed. Does this product really worth getting on production network? Product looks cool and give us what we really want but I am kinda skeptical with OS support thing. Can you shed some light here?
Isn’t there some stat like most successful threat actors are moving around the network for 6 months before detection on average? I mean all you really need is 30 days.
Love you, love your content. That website is bullshit, I couldn't find anything below 295+ for courses and the first class I looked at was $100-$1000 per person. I don't know of you know this but if you do... shame
did you do more than just look at one page? Did you adjust the sliders on the page? Did you go to where the actual payment is that was shown in the video that shows you what the minimum price is?
@nordgaren2358 who are you to attack me with questions? That's very rude. I did look around and check out different things. Why would you assume I did not? Just because I used the first video as a reference? Would me saying, "The 38th episode I saw...". As weird as it sounds, the first one I happened to click upon was a pricey one. I did check out others, but I didn't look at too many because they were pricey.
You are literally also quoting the price for access to the cyber range, which is in ADDITION to the training. Not the training itself. So there are multiple reasons to think you didn't look. I literally clicked the first available course, and it says $25 as the minimum price. That is exactly as advertised.
@johnhammond you had me at pcap - Gonna check out this tool to complement my Wireshark analysis. Great vid my friend!
xoxoxo
Lets gooo! I've always had a soft spot for threat hunting. I just didn't realize there was a term for it until recently 🤣 I love messing with AC Hunter/RITA. I just took the Active Defense & Cyber Deception course last week. I am in the Zoom webinar now for the SOC Core Skills class now. John Strand is an amazing teacher as well!
BHIS and Antisyphon are killing it in the training area. I just to the Antisyphon SOC Core Skills and it is upping my game and making me more confident as a New to SOC analyst. Thanks for covering this John I look forwarded to doing a lab with this. Keep it up!
John, just realized you hit over 1M subs!
Congrats and thank you for peaking my interest in cyber security!
As a product designer in cyber, the UI makes my soul hurt. It looks like work I did back in 2007, and although it’s got that “coooool” factor, there is a tremendous amount of non-data pixels which impacts usability, accessibility, and cognitive load.
Yep, the UI is horrendous, it looks like some old Flash stuff or cheap Hollywood. Ironically, RITA, which is just the engine and html report files is better.
@@Ati27 that’s hilarious because it reminds me of old flash work of mine from the days before everyone knew flash was about as secure as a tinfoil boat.
Great video . I just started watching but I don’t expect anything less from you 👍😎
You're first, and I'm fourth. 🤝🫡 Shalom.
Awesome vlog, loved the suggested training.
Another amazing project for doing this is Malcolm (as in in the middle)
I have a question; we are considering setting up AC-Hunter. AC hunter docs says that the preferred systems are ubuntu 16, 18, 20.04. For 20.04, support is going to be ended in April 2025. I tried installing it on 24.04 but the installation was failed. Does this product really worth getting on production network? Product looks cool and give us what we really want but I am kinda skeptical with OS support thing. Can you shed some light here?
Isn’t there some stat like most successful threat actors are moving around the network for 6 months before detection on average?
I mean all you really need is 30 days.
Now things getting interesting, infosec people gives some focus on designing, by the way fantastic tool and yeah does it works on linux as well??
How viable is this? Is this used in the field as a viable tool?
great videos
99% of these connections are going to be Google and Microsoft. 😑
John just showed you the C2 over Gmail infrastructure, din't assume it is all good
@@eli_the_crypto_guy none of it is good. name a bigger apt than google and Microsoft. (Of course they mean well, so they'd be the unintentional apt)
You can safelist those connections then they won't keep showing up, like literally any defensive tool there is a period of baselining.
I always keep mistaken your name for John Hammond from jurassic park
would normally just de-bell but i like you john -- not a fan of the "cool sounding generic topic / advertisement' format
Thanbi thrastha wadiyo onama pon akak kelinawa unta viruddawa cament dapu gaman k.o
Please help me 🥺
cool tool
Love you, love your content. That website is bullshit, I couldn't find anything below 295+ for courses and the first class I looked at was $100-$1000 per person. I don't know of you know this but if you do... shame
did you do more than just look at one page? Did you adjust the sliders on the page? Did you go to where the actual payment is that was shown in the video that shows you what the minimum price is?
@nordgaren2358 who are you to attack me with questions? That's very rude. I did look around and check out different things. Why would you assume I did not? Just because I used the first video as a reference? Would me saying, "The 38th episode I saw...". As weird as it sounds, the first one I happened to click upon was a pricey one. I did check out others, but I didn't look at too many because they were pricey.
@@therealslimpanda I asked you if you did your due diligence. I didn't attack you.
@@therealslimpanda what makes me think you didn't is because other people have had this problem, and because I have seen the pricing myself.
You are literally also quoting the price for access to the cyber range, which is in ADDITION to the training. Not the training itself. So there are multiple reasons to think you didn't look. I literally clicked the first available course, and it says $25 as the minimum price. That is exactly as advertised.
it should be open source and not walled garden paid training jazz - this is more or less just a rev grab
yeah how dare they charge money for their time and effort, you are owed everything for free obvs.
😃👍
beautiful beautiful world superb 7Starrrrrrrstopplerrrs godee knowledgeable wellth cute superb heero respectable loving venus❤❤❤
Early crew. 4th. Lulz. XD Shalom.
Nothing is understandable
One day it will all make sense my friend