Signatures Are Dead - Long Live Resilient Signatures
Offered By: BruCON Security Conference via YouTube
Course Description
Overview
Explore the intricacies of creating resilient, high-fidelity threat detections in this 57-minute conference talk from BruCON Security Conference. Delve into the challenges of developing signatures that withstand evasion attempts by dedicated attackers and researchers. Learn from FireEye's Advanced Practices Team as they share insights on their processes and approaches to detection development, including practical examples derived from real-world attacks. Discover the importance of proper tools, visibility, and a methodical, iterative approach in crafting effective detections. Gain valuable knowledge on various topics, including signature definition, detection methodologies, sample set assembly, existing protection testing, data generation, rule writing, and intelligence gathering. Examine specific examples such as register32 detection, FTP WebDAV, argument reordering, and HTTPS SCT Detection. Understand the attack lifecycle and the significance of knowing your tools and new application techniques in the ever-evolving landscape of cybersecurity.
Syllabus
Intro
Presentation Outline
Background
What is a signature
What are the other opportunities
What are good signatures
How we think about detection
What is it
How to find it
Assembling sample sets
Testing existing protections
Generating data
Writing rules
Intelligence Gathering
Example
Group Samples
Detection
Mutual Support
enumerate
test
register32 overview
register32 detection
FTP WebDAV
Argument reordering
Arguments
Changing Arguments
Double Quotes
HTTP
SCT Detection
Class ID
Script Tags
Script Language
Whitespace
Attack Lifecycle
Summary
Know your tools
New application techniques
Taught by
BruCON Security Conference
Related Courses
TOTAL: CompTIA CySA+ Cybersecurity Analyst (CS0-003)Udemy Operationalizing Cyber Threat Intel: Pivoting & Hunting
Pluralsight Threat Hunting with Yara
Pluralsight Enterprise Security: Policies, Practices, and Procedures
Pluralsight Managing and Responding to Security Events Using Azure Sentinel
Pluralsight