Back to Browse

Attack Detection Fundamentals: Workshop #1 - Initial Access

5.8K views
Jul 2, 2020
1:06:35

Alfie Champion and Riccardo Ancarani kicked-off the Attack Detection Fundamentals series with Initial Access. Watch to: - Learn the techniques threat actors use to bypass mail filtering controls and obtain foothold - Make use of open-source tools to emulate the initial access vectors of Emotet and those used in Operation Cobalt Kitty - Learn how to detect these attacks using endpoint logs or memory analysis You can find the workshop guides over on the F-Secure Labs website: Lab guide 1: https://labs.f-secure.com/blog/attack-detection-fundamentals-initial-access-lab-1 Lab guide 2: https://labs.f-secure.com/blog/attack-detection-fundamentals-initial-access-lab-2 Lab guide 3: https://labs.f-secure.com/blog/attack-detection-fundamentals-initial-access-lab-3 Lab guide 4: https://labs.f-secure.com/blog/attack-detection-fundamentals-initial-access-lab-4

Download

0 formats

No download links available.

Attack Detection Fundamentals: Workshop #1 - Initial Access | NatokHD