Intrusion Hunting for the Masses - A Practical Guide

Intrusion Hunting for the Masses - A Practical Guide

via YouTube Direct link

+ Checking How Outsiders See You

17 of 22

17 of 22

+ Checking How Outsiders See You

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Intrusion Hunting for the Masses - A Practical Guide

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 What Works Finding Intrusions?
  3. 3 What Do I Mean by "Hunting"?
  4. 4 Shimcache/Amcache
  5. 5 Shimcache Examples
  6. 6 What to Look for in the Shimcache/ Amcache Data
  7. 7 Server Antivirus Logs
  8. 8 Mining Netstat Data
  9. 9 User-Agent strings
  10. 10 User-Agent examples
  11. 11 o. Windows Services Example
  12. 12 + Windows Drivers Example
  13. 13 Windows Autoruns
  14. 14 Autoruns - Examples
  15. 15 Windows Prefetch
  16. 16 Prefetch Examples
  17. 17 + Checking How Outsiders See You
  18. 18 NTFS Extended Attributes
  19. 19 EMET Log Mining - Example
  20. 20 Hunting in RAM dumps
  21. 21 Closing Thoughts
  22. 22 Questions?

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.