PLAY PODCASTS
Reverse Analyzing Attacks for Detection, Justin Henderson Paul's Security Weekly #519

Reverse Analyzing Attacks for Detection, Justin Henderson Paul's Security Weekly #519

Paul's Security Weekly (Video) · Security Weekly Productions

June 25, 201736m 24s

Audio is streamed directly from the publisher (dts.podtrac.com) as published in their RSS feed. Play Podcasts does not host this file. Rights-holders can request removal through the copyright & takedown page.

Show Notes

Learn how to use Windows Event Logs to catch attackers in your network, including domain admin group enumeration and mimikatz attacks! Justin Henderson (@SecurityMapper) categorizes these techniques as "reverse attack analysis for detection" and shows us how to do it in this technical segment! References to Mark Baggett's work on freq.py are made as well (https://isc.sans.edu/forums/diary/Detecting+Random+Finding+Algorithmically+chosen+DNS+names+DGA/19893/)

Full Show Notes: https://wiki.securityweekly.com/Episode519

Security Weekly Web Site: http://securityweekly.com

Follow us on Twitter: @securityweekly