Black Hills Information Security 09月29日 10:50
网络安全:应对网络入侵的应对措施
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

本文探讨了在怀疑网络遭受入侵时,如何采取应对措施。包括现场取证、PowerShell脚本、网络和事件日志分析、IR电子表格和清单等。











In this webcast, we will cover what we can do if we think there is a breach on our network.



We will cover live forensics, cool PowerShell scripts, network, and event log analysis, cool IR spreadsheets, and checklists.



We will also be covering the status of our ELK project for reviewing Event ID 3 from Sysmon.



So, a lot… Yep… A crazy amount.



Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/09/SLIDES_ThinkYoureCompromised.pdf



00:00 – Intro



00:47 – “Ok, But Why”



02:17 – Have It The Wrong Way



04:35 – Have It The Right Way



06:58 – Lego My Incident Response



08:25 – Monologging On Mute



11:57 – Wouldn’t Be Prudent



14:29 – “Better Than Bad, It’s Good”



21:33 – A Van Full of Free Tools



44:10 – CSI: Memory



45:01 – We Got Cheat Sheets if You Want Some Cheat Sheets



47:20 – Overlapping Venn Diagrams



49:46 – Questions in the Wild



59:15 – Sucking at Capitalism

















Want to level up your skills and learn more straight from John himself?You can check out his classes below!



<a href="https://www.antisyphontraining.

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

网络安全 网络入侵 应对措施 取证 PowerShell
相关文章