Logging for Hackers - How You Can Catch Them With What You Already Have and a Walk Through of an
Offered By: YouTube
Course Description
Overview
Explore advanced logging techniques for cybersecurity professionals in this 56-minute conference talk from Circle City Con 2016. Learn how to effectively catch hackers using existing tools and resources. Dive into topics such as evolving security practices, statistical analysis, hash tracking, Windows NT persistence, and artifact analysis. Discover insights on PowerShell logging, command-line monitoring, and malware management. Gain practical knowledge on identifying suspicious activities, conducting login audits, and leveraging free tools like AuditPro. Examine case studies involving crypto-related threats and Word document exploits. Conclude with an overview of Windows Firewall configurations and valuable cybersecurity resources to enhance your defensive capabilities.
Syllabus
Intro
Why listen to me
Evolve or die
Statistics
Chasing Hashes
Win NT
Persistence
Program Files
C tar
Droidx artifacts
Dried X persistence
Dried X is back
PowerShell
Cheat Sheet
Command Line Logging
Example Query
Practice Malware Management
What do we look for
What do we take away
LoginD
Audit Report
Purpose
Free Audit
Pro
Future
Crypto
Word Doc
Windows Firewall
What do you get
Resources
Questions
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network