No video

Hunting Threat Actors Using OSINT

  Рет қаралды 13,339

SANS Digital Forensics and Incident Response

SANS Digital Forensics and Incident Response

Жыл бұрын

SANS DFIR Summit 2022
Speaker: Abi Waddell
Little attention is given to tracking the perpetrators of cyber-attacks in the world of forensics. DFIR teams can usually attempt to answer the question of what an attacker did, how they did it and when, but rarely who has done something. Fortunately, there are some methods of answering this question using open-source intelligence - methods which have been used successfully to trace the location and identity of threat actors in recent years. Attendees will learn how to get OSINT leading to the identification of a threat actor, based on real life examples, techniques and demos of new free tools including:
• Revealing deleted parts of screenshots and PDF files
• Discerning fake social media accounts
• Finding IP addresses belonging to VPN services likely to be used by cyber criminals
• Results of original research of thousands of leaked accounts, into identifying gender, age and predicted passwords in use, from the chosen usernames and passwords.
• Uncovering identities from pseudonyms
• Using account leaks, search engine analytics, maps, social media, images and more, to hunt threat actors.
This talk will show how focusing more on finding the source of cyber breaches will reduce attacks in the long run and how OSINT can be harnessed legally to discover the identity of cyber criminals. Key takeaways:
Techniques and tools to find the identity of a threat actor based on real life examples, how focusing more on finding the source of cyber breaches will reduce these attacks in the long run and the types of OSINT and how it can be harnessed legally to discover the identity of threat actors.
View upcoming Summits: www.sans.org/u/DuS
Download the presentation slides (SANS account required) at www.sans.org/u/1iaE

Пікірлер: 8
@mattdoesflyfishing
@mattdoesflyfishing Жыл бұрын
The information on gender based password selection was super interesting! Can't say I was a fan of the subtle hint at men considering ships, cars and women as "inanimate" objects. In contrast, I would propose that ships, planes and cars much, like women, elicited an emotional response and thus they are named after women. This should be seen as an endearing quality in men. You know, just in case the speakers comments might be taken out of context.
@thethree60five
@thethree60five Жыл бұрын
Social engineering is done on a target. Cultural, location, politics, gender, age, education, social media, family, provider, devices, cell and base loc vs statically likely correctness, the more you get, the more likely your testing is correct. As Sun Tzu said, "Know your enemy better than yourself."
@FirstnameLastname-pe5ib
@FirstnameLastname-pe5ib Жыл бұрын
Good call.
@Loicmartins
@Loicmartins 3 ай бұрын
Thanks for the sharing!
@SD-eu7ht
@SD-eu7ht Жыл бұрын
Brilliant
@arsalananwar8265
@arsalananwar8265 Жыл бұрын
nice info
@theplastolithicpast8257
@theplastolithicpast8257 Жыл бұрын
Alternative title: "How to be an effective stalker"
@rey_nevan
@rey_nevan Жыл бұрын
A Practical Case of Threat Intelligence - From IoC to Unraveling an Attacker Infrastructure
23:49
SANS Digital Forensics and Incident Response
Рет қаралды 6 М.
My “Aha!” Moment - Methods, Tips, & Lessons Learned in Threat Hunting - SANS THIR Summit 2019
33:41
SANS Digital Forensics and Incident Response
Рет қаралды 14 М.
Why Is He Unhappy…?
00:26
Alan Chikin Chow
Рет қаралды 92 МЛН
НРАВИТСЯ ЭТОТ ФОРМАТ??
00:37
МЯТНАЯ ФАНТА
Рет қаралды 9 МЛН
小蚂蚁被感动了!火影忍者 #佐助 #家庭
00:54
火影忍者一家
Рет қаралды 51 МЛН
IQ Level: 10000
00:10
Younes Zarou
Рет қаралды 13 МЛН
Thinking DFIRently From Entry to Specialty
1:37:51
SANS Digital Forensics and Incident Response
Рет қаралды 2,7 М.
Run OSINT Investigations on Businesses & CEOs [Tutorial]
13:52
Exploring Ransomware Builders
50:00
Cyber from the Frontlines
Рет қаралды 3,9 М.
OSINT Tools for Diving Deep into the Dark Web
37:57
SANS Cyber Defense
Рет қаралды 23 М.
SANS Threat Analysis Rundown (STAR)
59:41
SANS Digital Forensics and Incident Response
Рет қаралды 1,2 М.
OSINT Live Training by Authentic8 28 APR: Dark Web Research
49:18
Using OSINT to find his apartment!
13:28
Gary Ruddell
Рет қаралды 155 М.
The Coolest OSINT Mapping Tool You've Never Seen
4:13
Gary Ruddell
Рет қаралды 29 М.
The Cycle of Cyber Threat Intelligence
1:00:27
SANS Digital Forensics and Incident Response
Рет қаралды 113 М.
Analysis Paralysis? Setting the Right Goal for Your Incident Analysis
31:01
SANS Digital Forensics and Incident Response
Рет қаралды 2,2 М.
Why Is He Unhappy…?
00:26
Alan Chikin Chow
Рет қаралды 92 МЛН