How to Threat Hunt for C2 Traffic Regardless of Protocol or Port Published 2019-09-11 Download video MP4 360p Download video MP4 720p Recommendations 1:02:29 How to Spot C2 Traffic on Your Network 37:12 SOC Visibility Triad, Why You Need NDR Alongside EDR 27:53 Hunting C2 Beaconing at Scale in the Modern Age 34:12 A Technical Introduction to Zeek/Bro, Network Security's Best Kept Secret 19:00 How Hackers Use netsh.exe For Persistence & Code Execution (Sliver C2) 1:21:16 Detecting & Hunting Ransomware Operator Tools: It Is Easier Than You Think! 16:01 Wireshark - Malware traffic Analysis 50:08 How Corelight Transforms Data Security with Normalyze 20:24 Leveraging Beacon Detection Techniques to Identify Anomalous Logons | 2020 THIR Summit 59:12 From Noise to Signal: Enrichment and Routing with Corelight, Cribl, and Elastic 1:01:52 FICON 101 41:11 Attack Detection Fundamentals: Workshop #4 - C2 and Exfiltration 1:02:21 Network Detection and Incident Response with Open Source Tools 54:29 Stronger Together, RSAC 2023: Navigating security events with cyber partners 23:02 Software Engineering Mock Interview - Find Duplicate Files 1:00:24 Is Network Evidence Really Needed for Security Operations? 07:54 What is Command and Control? 07:51 Detecting Malware Beacons with Zeek and RITA 13:59 Open Source Cyber Threat Hunting with Zeek: Getting Started Similar videos 00:45 Threat Hunting: Unusual Port Protocol Combinations 10:16 Threat Hunting Shorts - C2 over DNS | Chris Brenton 07:05 Network Traffic Hunting 06:01 How To Threat hunt Like A Pro: The Easy Way 07:46 Detecting the Sliver C2 Framework | Threat SnapShots 1:01:10 How To Threat Hunt in Encrypted Network Traffic- SANS Institute 42:15 How to find C2 activity with Zeek and MITRE ATT&CK 11:34 How to hunt Cobalt Strike C2s using Threat Intelligence 09:29 WREAKING HAVOC: Hunting for Havoc C2 and Exorcising Demons from your Network | Threat SnapShot 3:25:30 #SaturdayHackerday: Threat Hunting for Sliver C2 32:06 How to threat hunt in your SIEM with the right network data 1:02:25 Demystifying The Hunt How to Assess Your Threat Hunting Readiness and Prepare for the Next Step 08:57 Exfiltration Over Command and Control Channel Visibility Using RSA NetWitness Platform 23:56 Offensive Security: C2 - Intro to C2 16:05 Cobalt Strike: Decrypting C2 Traffic With A "Leaked" Private Key 31:16 BZAR – Hunting Adversary Behaviors with Zeek and ATT&CK - SANS THIR Summit 2019 More results