(Intermediate) Open-Source Tools for Hunting and Practical Intelligence

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • aNullValue
    Moderator
    • Jun 2019
    • 584

    #1

    (Intermediate) Open-Source Tools for Hunting and Practical Intelligence

    Title: (Intermediate) Open-Source Tools for Hunting and Practical Intelligence

    Description:
    Organizations need to identify and disposition new threats to ensure active, adaptive defense. This workshop will walk through open source resources and freely-available techniques to identify new threats and attack trends, and how to then formulate defensive strategies for enterprise protection.

    Open source intelligence and information gathering
    Company blogs, articles, and media reporting
    Distinguishing between technical reporting and pure marketing
    "Reading between the lines" for search terms
    Social media and Twitter
    Suggested accounts
    Source vetting and evaluation
    Public threat feeds: AlienVault, IBM X-Force
    Registration and data retrieval

    Timeliness and value

    Sample gathering and extracting information
    HybridAnalysis, ANY.RUN, MalShare, VirusShare – VT (commercial)
    Capabilities and limitations of free services
    Evaluating different reporting types, extracting information for further searching
    How to read an analysis or incident report
    More reading between the lines
    Going beyond hashes and IPs

    Extracting information for use and application

    Formulating information into hypotheses and pivoting
    Network pivoting: DomainTools, RiskIQ, Censys, Shodan, Urlscan, VirusTotal (free)
    The art of network pivoting without going 'too far'
    Pivoting types: registration information, SOA leaks, infrastructure similarities, etc.
    Host/Binary pivoting: VirusTotal, HybridAnalysis, ANY.RUN, etc.
    File metadata and compilation artifacts

    Identifying common tooling, techniques, and references to publicly-available projects

    Overview and exercise:
    Beginning with a single sample (malicious document file), extracting additional information
    Identifying items of interest in document, identifying payload
    Using information to identify general patterns, trends, and behaviors
    Translating identified information into rules, hunting hypotheses, and defensive measures
    Deliverable: Additional IOCs, brief report for review and feedback (after conclusion of workshop)

    Speaker(s): Joe Slowik

    Location: Blue Team Vlg / Blue Team Vlg - Workshop Track 1

    Discord: https://discord.com/channels/7082082...54317658734613

    Event starts: 2020-08-07 16:30 (04:30 PM) PDT (UTC -07:00)

    Event ends: 2020-08-07 18:00 (06:00 PM) PDT (UTC -07:00)

    For the most up-to-date information, please either visit https://info.defcon.org, or use HackerTracker, which is available for iOS and Android. This is an automated message, and this data was last modified 2020-08-02T22:55 (UTC).
    Starts
    August 7, 2020 16:30
    Ends
    August 7, 2020 18:00
    Location
    Blue Team Vlg / Blue Team Vlg - Workshop Track 1
    Last edited by aNullValue; August 2, 2020, 17:44.
Working...