Applying The Threat Hunter's Runbook | Chris Brenton | 1 Hour

If you like what I do in hacking and want to support, I invite you to visit our store to buy cheap and exclusive nfts: https://mintable.app/u/cha0smagick



–––– Chat in Discord: Join the Threat Hunter Community: https://ift.tt/X2N8k1u 00:00 - FEATURE PRESENTATION 09:46 - DEMO on Screen 55:20 - Questions and Closing So you've studied threat hunting methodology and researched all the threat hunting tools... but how do you actually apply all this knowledge into doing a real threat hunt? In this webcast, Chris Brenton will walk through using Zeek and RITA to do a full hunt from the initial review of the data, through identifying which host is compromised to pinpoint what (if any) data has been exfiltrated. Join our Threat Hunter Community Discord Server to join in on the conversation during and after the webcast: https://ift.tt/X2N8k1u


For more hacking info and tutorials visit: https://sectemple.blogspot.com/

Hello and welcome to the temple of cybersecurity. If you are looking for tutorials and all the news about the world of hacking and computer security, you have come to the right place. We invite you to subscribe to our newsletter in the box at the top and to follow us on our social networks:

Twitter: https://twitter.com/freakbizarro
Facebook: https://web.facebook.com/sectempleblogspotcom/
Discord: https://discord.gg/5SmaP39rdM

We also invite you to visit the other blogs in our network, where you can find something for every taste.
https://elantroposofista.blogspot.com/
https://gamingspeedrun.blogspot.com/
https://skatemutante.blogspot.com/
https://budoyartesmarciales.blogspot.com/
https://elrinconparanormal.blogspot.com/
https://freaktvseries.blogspot.com/

#hacking, #infosec, #tutorial, #bugbounty, #threathunting, #opensource, #pentest, #pentesting, >

Comments