SPECIAL PRESENTATION: Backdoors & Breaches Live
S:E1

SPECIAL PRESENTATION: Backdoors & Breaches Live

Summary

00:00 - Introduction01:22 - The Scenario02:50 - First Steps03:48 - Endpoint Analysis Roll04:22 - Logon Scripts Were installed05:09 - I.R. Team Introductions07:17 - Second Step10:32 - Network Threat Hunting Roll11:36 - Third Step15:12 - Anyway Here’s Firewall Roll15:43 - Fourth Step18:26 - SIEM Roll19:41 - Fifth Step20:47 - UEBA Roll21:19 - Senario Recap22:20 - Senario Plausibility?25:51 - Wrap-up Takeaways

00:00 - Introduction

01:22 - The Scenario

02:50 - First Steps

03:48 - Endpoint Analysis Roll

04:22 - Logon Scripts Were installed

05:09 - I.R. Team Introductions

07:17 - Second Step

10:32 - Network Threat Hunting Roll

11:36 - Third Step

15:12 - Anyway Here’s Firewall Roll

15:43 - Fourth Step

18:26 - SIEM Roll

19:41 - Fifth Step

20:47 - UEBA Roll

21:19 - Senario Recap

22:20 - Senario Plausibility?

25:51 - Wrap-up Takeaways

  • (00:00) - Introduction
  • (01:21) - The Scenario
  • (02:50) - First Steps
  • (03:47) - Endpoint Analysis Roll
  • (04:21) - Logon Scripts Were installed
  • (05:09) - I.R. Team Introductions
  • (07:16) - Second Step
  • (10:32) - Network Threat Hunting Roll
  • (11:36) - Third Step
  • (15:12) - Anyway Here's Firewall Roll
  • (15:42) - Fourth Step
  • (18:26) - SIEM Roll
  • (19:41) - Fifth Step
  • (20:47) - UEBA Roll
  • (21:18) - Senario Recap
  • (22:19) - Senario Plausibility?
  • (25:50) - Wrap-up Takeaways