Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Hunting Threat Actors Using OSINT

Автор: SANS Digital Forensics and Incident Response

Загружено: 2022-11-28

Просмотров: 15654

Описание:

SANS DFIR Summit 2022

Speaker: Abi Waddell

Little attention is given to tracking the perpetrators of cyber-attacks in the world of forensics. DFIR teams can usually attempt to answer the question of what an attacker did, how they did it and when, but rarely who has done something. Fortunately, there are some methods of answering this question using open-source intelligence – methods which have been used successfully to trace the location and identity of threat actors in recent years. Attendees will learn how to get OSINT leading to the identification of a threat actor, based on real life examples, techniques and demos of new free tools including:

• Revealing deleted parts of screenshots and PDF files
• Discerning fake social media accounts
• Finding IP addresses belonging to VPN services likely to be used by cyber criminals
• Results of original research of thousands of leaked accounts, into identifying gender, age and predicted passwords in use, from the chosen usernames and passwords.
• Uncovering identities from pseudonyms
• Using account leaks, search engine analytics, maps, social media, images and more, to hunt threat actors.

This talk will show how focusing more on finding the source of cyber breaches will reduce attacks in the long run and how OSINT can be harnessed legally to discover the identity of cyber criminals. Key takeaways:

Techniques and tools to find the identity of a threat actor based on real life examples, how focusing more on finding the source of cyber breaches will reduce these attacks in the long run and the types of OSINT and how it can be harnessed legally to discover the identity of threat actors.

View upcoming Summits: http://www.sans.org/u/DuS
Download the presentation slides (SANS account required) at https://www.sans.org/u/1iaE

Hunting Threat Actors Using OSINT

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

A Practical Case of Threat Intelligence – From IoC to Unraveling an Attacker Infrastructure

A Practical Case of Threat Intelligence – From IoC to Unraveling an Attacker Infrastructure

OSINT Tools for Diving Deep into the Dark Web

OSINT Tools for Diving Deep into the Dark Web

Getting Into Cybersecurity - An Interview with Michelle Eggers!

Getting Into Cybersecurity - An Interview with Michelle Eggers!

OSINT Techniques to Find the FBI's Most Dangerous Fugitives

OSINT Techniques to Find the FBI's Most Dangerous Fugitives

AI-Driven OSINT in the Hands of Cybercriminals | James McQuiggan

AI-Driven OSINT in the Hands of Cybercriminals | James McQuiggan

OSINT для новичков: найдите всё о юзернейме и фото с Sherlock и Google Dorks!

OSINT для новичков: найдите всё о юзернейме и фото с Sherlock и Google Dorks!

Cyber Threat Intelligence Workshop

Cyber Threat Intelligence Workshop

Решаем РЕАЛЬНОЕ расследование с помощью OSINT

Решаем РЕАЛЬНОЕ расследование с помощью OSINT

Making Those Connections: Using Obsidian in Your OSINT Work

Making Those Connections: Using Obsidian in Your OSINT Work

Analysis Paralysis? Setting the Right Goal for Your Incident Analysis

Analysis Paralysis? Setting the Right Goal for Your Incident Analysis

Threat Hunting in Security Operation - SANS Threat Hunting Summit 2017

Threat Hunting in Security Operation - SANS Threat Hunting Summit 2017

Мы взломали камеры безопасности Flock менее чем за 30 секунд. 🫥

Мы взломали камеры безопасности Flock менее чем за 30 секунд. 🫥

Unveiling shadows: key tactics for tracking cyber threat actors, attribution, and infrastructure...

Unveiling shadows: key tactics for tracking cyber threat actors, attribution, and infrastructure...

Real-Time Threat Hunting - SANS Threat Hunting & Incident Response Summit 2017

Real-Time Threat Hunting - SANS Threat Hunting & Incident Response Summit 2017

Противодействие наблюдению с помощью Bluetooth!

Противодействие наблюдению с помощью Bluetooth!

DEF CON 33 — Истории от разработчика Tor — Роджера «arma» Динглдина

DEF CON 33 — Истории от разработчика Tor — Роджера «arma» Динглдина

SANS Threat Analysis Rundown (STAR) with Katie Nickels

SANS Threat Analysis Rundown (STAR) with Katie Nickels

Используем OSINT, чтобы найти его квартиру!

Используем OSINT, чтобы найти его квартиру!

Operations Security (OPSEC) tradecraft tips for online Open Source Intelligence (OSINT) Research

Operations Security (OPSEC) tradecraft tips for online Open Source Intelligence (OSINT) Research

Инструменты OSINT для отслеживания вас. Вы не сможете спрятаться.

Инструменты OSINT для отслеживания вас. Вы не сможете спрятаться.

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]