Black Hills Information Security 09月29日 10:50
威胁情报:持久化与开源工具解析
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

本文探讨了威胁情报的持久化方法,分析了持久化威胁情报的优势,并介绍了利用ELK等开源工具进行攻击检测的案例。



































In this Black Hills Information Security webcast John breakdowns why he hates threat intelligence… Again…



But, he breaks down some of the cool new projects that are focusing on durable threat intelligence. This is key because many intel feeds are nothing more than domains, hashes, and IP addresses. However, with durable threat intel, we see attack techniques that are highly effective, yet are not as easy to block.



For example, application allow listing abuse, connection profiles (RITA!), PowerShell encoding are all examples of detects you can use that are not specific to a point in time attack methodology.



John also shares some very cool open source projects that are approaching attacks in this way using ELK.



Join the Black Hills Information Security Discord discussion server — https://discord.gg/aHHh3u5



Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/09/SLIDES_Durable_Ephemeral_Threat_Intel_Strand.pdf



0:00 – Be Excellent to Each Other



1:06 – Threat Intel: A Useless Rant



7:38 – Pyramid of Pain



10:55 – You Got Another String Coming



14:56 – Conversation With a Pompous John



19:10 – Hacking Ain’t Easy



22:21 – ATT&CK Bingo™



24:33 – Emulation for Iteration



27:35 – Some Open Source Tools



32:03 – Threat Emulation Warning



36:59 – MITRE Scorecard



45:49 – A Bit of Perspective



<a rel="noreferrer noopener" href="https://www.youtube.com/watch?

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

威胁情报 持久化 开源工具 ELK 攻击检测
相关文章