What the DLL is happening? A practical approach to identifying SOH -Frank McClain - SANS DFIR Summit Published 2020-09-10 Download video MP4 360p Download video MP4 720p Recommendations 1:37:51 Thinking DFIRently From Entry to Specialty 54:01 SANS Webcast: Effective (Threat) Hunting Techniques 37:47 Bridging the Intelligence Divide: Building CTI Blueprints for Value-Based Production 24:11 Limerence For Someone Who Rejected You IS a Form of Avoidance 1:02:28 CppCon 2017: James McNellis “Everything You Ever Wanted to Know about DLLs” 38:40 Beyond the Basics: The Role of LLM in Modern Threat Intelligence 49:36 Ransomware Kingpins LockBit Disrupted 37:52 Threat Intelligence is a Fallacy, but I May be Biased 27:10 HyperQast Episode 1: DLL Search Order Hijacking 1:09:14 Mapping GPT revealed something strange... 02:28 All you need to know about FOR508 - Advanced Incident Response & Digital Forensics 59:41 SANS Threat Analysis Rundown (STAR) 04:38 Top 11 OSINT Tools of 2024 by Ritu Gill - #3 is Essential 3:36:55 Kubernetes Tutorial for Beginners [FULL COURSE in 4 Hours] 50:06 The Many Meanings of Event-Driven Architecture • Martin Fowler • GOTO 2017 17:30 Running a Buffer Overflow Attack - Computerphile 35:03 Clustering Attacker Behavior: Connecting the Dots in the RaaS Ecosystem 19:40 Web Server Concepts and Examples Similar videos 36:31 Making Memories: Using Memory Analysis for Faster Response to User Investigations - SANS DFIR Summit 29:25 Kansa for Enterprise scale Threat Hunting w/ Jon Ketchum - SANS DFIR Summit 2020 39:34 Chris Le Roy - What the Dll? Finding and Exploiting DLL preloading vulnerabilities. 06:56 DLL Hijacking | System Hacking through Malicious DLL | Network Pentesting (Ummed Meel-Cyber Expert) 46:11 RT104 DIY Vulnerability Discovery with DLL Side Loading Jake Williams 01:42 Dll Proxying 01:33 [Writeup] BSides San Fransisco CTF 2019 - Zippy [Forensics] 02:21 AUTOPSY Free Incident Response (DFIR) Training!! Hurry up limited Seats only. 56:27 The havoc Podcast - John Dwyer: X-Force and DLL Side-Loading 1:14:37 DLL Hijacking with Invoke PrintDemon 02:37 Slow Dll Hijack Vulnerability Exploitation Using Dllhijackauditor 16:07 DLL Proxy 36:06 Memory Forensics 101 14:32 Threat actors Sideloading - PlugX General Walkthrough 03:02 Episode 15: “Quick Win” files #1 - The Registry-Part 2 02:16 Lockbit Ransomware - DLL Hijack PoC 23:56 MITRE ATT&CK Framework | The Defender's Cheat Code 53:46 Run a DFIR investigation the easy way... - Juan Vera & Abraham Pasamar [RootedCON2020-ES] More results