Better Know an Adversary, or 10 Things You Should Hate in Your Network
Jim Miller Miller
Runtime: 25:35
In this session, the presenter will cover the 10 legitimate tools most often observed by the Falcon OverWatch team that are used by targeted attackers. This session will include a demonstration of their use as well as detection methods/forensic evidence to determine if these tools have been used maliciously in a victim network. The data for this comes from the OverWatch quarterly report which is available to customers via the Falcon UI.
Related Videos
Elevate Your Game: Creating Tabletop Exercises that Actually Improve Your Team
Threat Hunting & Incident Response
Elevate Your Game: Creating Tabletop Exercises that Actually Improve Your Team
Multiple Speakers
CrowdStrike
27:44
Tales From the Crypt 2020: Case Studies in Ransomware
Threat Hunting & Incident Response
Tales From the Crypt 2020: Case Studies in Ransomware
Multiple Speakers
CrowdStrike
16:12
Drinking from the Tap: Network Security Monitoring
Threat Hunting & Incident Response
Drinking from the Tap: Network Security Monitoring
Multiple Speakers
CrowdStrike
23:54
{Will be replaced by the modal content}