detecting long connections with zeek/bro and rita
Published 4 years ago • 3.8K plays • Length 8:05Download video MP4
Download video MP3
Similar videos
-
7:51
detecting malware beacons with zeek and rita
-
1:08:13
rita - finding bad things on your network using free and open source tools
-
1:07:52
getting started with rita (real intelligence threat analytics) chris brenton | 1 hour
-
1:28:59
a|c – the ins and outs of rita | chris brenton & lisa woody | 1-hour
-
57:02
two covert command & control (c2) channels
-
1:00:45
an introduction to threat hunting with zeek (bro)
-
9:06
network security monitoring with zeek ( bro) and elastic siem lab
-
34:12
a technical introduction to zeek/bro, network security's best kept secret
-
1:02:27
think you're compromised? what do we do next?
-
55:48
a|c – getting the details from zeek | bill stearns & keith chew | 1 hour
-
1:48:55
bhis | looking for needles in needlestacks w/ threat hunting toolkit | derek banks & ethan robish
-
14:53
egress traffic analysis | the soc age- or, a young soc analysts illustrated primer | john strand
-
13:44
active defense cybersecurity techniques | using tools like bro, rita, applocker, and canary tokens
-
1:14:55
how to build a home lab – bill stearns
-
59:21
getting started in cyber deception
-
48:00
threat hunting beacon analysis
-
58:19
exploring beaker w/ chris brenton (1-hour)