Description
1 – Phases Overview? 01 Phases Overview 02 Hunting and Features Extraction 03 Behavior Extraction 04 Clustering and Correlation & Threat Actor Attribution 05 Tracking and Taking Down ?2 – Hunting? 06 VirusTotal 07 Lab-VirusTotal Intelligence 08 Hacking Forums 09 DeepWeb 10 Honeypot and OSINT ?3 – Features Extraction? 11 Intro 12 Import Table Hash (imphash) 13 Strings 14 Lab 1-Extracting VBA Macros with Didier Stevens Tools 15 Lab 2-C2 IP Pivoting ?4 – Behavior Extraction? 16 Dynamic Indicators 17 Process Infector, Keylogger & Passive DNS ?5 – Clustering and Correlation? 18 How Clustering & Correlation Work 19 GraphDB ?6 – Tracking? Size Last Modified 20 Passive DNS & Internet Port Scan 21 Lookups, OSINT & Hacking Forums ?7 – Taking Down? 22 Sinkhole 23 Hacking Forums & Victim Notification ?8 – Attribution? 24 Who Are The Targets and Where Are They Located_ 25 Tactics, Techniques & Procedures-Part 01 26 Tactics, Techniques & Procedures-Part 02 27 Profiling the Attacker
Reviews
There are no reviews yet.