YoVDO

Connecting the Dots - A Beginner's Experience of Threat Actor Tracking

Offered By: Security BSides London via YouTube

Tags

Security BSides Courses Cybersecurity Courses Wireshark Courses Threat Intelligence Courses Metadata Analysis Courses

Course Description

Overview

Explore the fundamentals of threat actor tracking in this 15-minute conference talk from Security BSides London. Dive into the world of cybersecurity as Keith Short shares his beginner's experience in identifying and following digital threats. Learn about the importance of tracking threat actors, setting up a safe environment, and utilizing tools like Wireshark for analysis. Discover techniques for extracting metadata, resolving domains, and mapping connections. Follow along as Short presents a real-world scenario, introducing threat actors Jessica Koran and Prince Ali, and demonstrates practical tracking methods. Gain valuable tips and insights to enhance your own threat intelligence capabilities in this concise yet informative presentation.

Syllabus

Introduction
Agenda
What are threat actors
Threat actor I tracked
Why track for actors
The scenario
Safe environment setup
Wireshark
Metadata
The hint
Finding more samples
Resolving domains
Map out
Pivot
Analyze
Jessica Koran
Prince Ali
Tracking methods
Tips
Summary
Outro


Taught by

Security BSides London

Related Courses

Introduction to Internetworking with TCP/IP
openHPI
Computer Networks and the Internet
Kiron via edX
Introduction to TCP/IP
Yonsei University via Coursera
Wireshark for Basic Network Security Analysis
Coursera Project Network via Coursera
Web Services Analysis With Python & Wireshark
Coursera Project Network via Coursera