Video On Demand
Better Know an Adversary, or 10 Things You Should Hate in Your Network
Jim Miller Miller
Jim Miller Miller
Runtime: 25:35
In this session, the presenter will cover the 10 legitimate tools most often observed by the Falcon OverWatch team that are used by targeted attackers. This session will include a demonstration of their use as well as detection methods/forensic evidence to determine if these tools have been used maliciously in a victim network. The data for this comes from the OverWatch quarterly report which is available to customers via the Falcon UI.

Related Videos

Threat Hunting & Incident Response Elevate Your Game: Creating Tabletop Exercises that Actually Improve Your Team
Multiple Speakers CrowdStrike 27:44
Threat Hunting & Incident Response Tales From the Crypt 2020: Case Studies in Ransomware
Multiple Speakers CrowdStrike 16:12
Threat Hunting & Incident Response Drinking from the Tap: Network Security Monitoring
Multiple Speakers CrowdStrike 23:54