YoVDO

From Threat Intelligence to Rapsheets in Just a Few Steps - DefCamp - 2016

Offered By: DefCamp via YouTube

Tags

DefCamp Courses Threat Intelligence Courses Scaling Courses Data Storage Courses Phishing Courses Honeypots Courses

Course Description

Overview

Explore a comprehensive talk from DefCamp 2016 on transforming threat intelligence into actionable rapsheets. Delve into topics such as virus scanning, honeypots, phishing, and passive DNS. Learn about system overview, facts, and the rationale behind the chosen model. Discover insights on data storage, modeling, and the benefits of graph-based approaches. Examine scaling strategies, statistics, IP age distribution, and malicious IP addresses by country. Gain knowledge about sandbox environments and their role in threat analysis. This presentation from Central and Eastern Europe's premier Hacking & Information Security conference offers valuable insights for security specialists, decision-makers, and developers in the INFOSEC field.

Syllabus

Intro
Virus Scanning
Honeypots
Phishing
Passive DNS
System Overview
System Facts
Why this model
Storage
Data Model
Why graph
Scaling up
Stats
IP Age Distribution
Malicious IP Addresses by Country
Question
Sandbox
Malicious


Taught by

DefCamp

Related Courses

The Model of Post-Quantum Signature Using Verkle Tree - DefCamp - 2022
DefCamp via YouTube
The Anatomy of Wiper Malware - DefCamp - 2022
DefCamp via YouTube
Internet Balkanization in an Era of Military Conflict - Dan Demeter - DefCamp - 2022
DefCamp via YouTube
How We Analyzed and Built an Exploit PoC for CVE-2022-24086, a Magento RCE - Catalin Filip - DefCamp - 2022
DefCamp via YouTube
To Log, or Not to Log! That Is the Question - DefCamp - 2022
DefCamp via YouTube