Alfie Champion and Riccardo Ancarani kicked-off the Attack Detection Fundamentals series with Initial Access. Watch to:
- Learn the techniques threat actors use to bypass mail filtering controls and obtain foothold
- Make use of open-source tools to emulate the initial access vectors of Emotet and those used in Operation Cobalt Kitty
- Learn how to detect these attacks using endpoint logs or memory analysis
You can find the workshop guides over on the F-Secure Labs website:
Lab guide 1: https://labs.f-secure.com/blog/attack-detection-fundamentals-initial-access-lab-1
Lab guide 2: https://labs.f-secure.com/blog/attack-detection-fundamentals-initial-access-lab-2
Lab guide 3: https://labs.f-secure.com/blog/attack-detection-fundamentals-initial-access-lab-3
Lab guide 4: https://labs.f-secure.com/blog/attack-detection-fundamentals-initial-access-lab-4