Threat Level: green Handler on Duty: Lorna Hutcheson

SANS ISC: Diaries by Keyword - SANS Internet Storm Center Diaries by Keyword


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
Date Author Title

DETECTION LAB

2017-12-14Russ McReeDetection Lab: Visibility & Introspection for Defenders

DETECTION

2018-04-06/a>Russ McReeThreat Hunting & Adversary Emulation: The HELK vs APTSimulator - Part 2
2018-04-05/a>Russ McReeThreat Hunting & Adversary Emulation: The HELK vs APTSimulator - Part 1
2017-12-14/a>Russ McReeDetection Lab: Visibility & Introspection for Defenders
2017-06-17/a>Guy BruneauMapping Use Cases to Logs. Which Logs are the Most Important to Collect?
2016-08-29/a>Russ McReeRecommended Reading: Intrusion Detection Using Indicators of Compromise Based on Best Practices and Windows Event Logs
2015-02-10/a>Mark BaggettDetecting Mimikatz Use On Your Network
2014-09-27/a>Guy BruneauWhat has Bash and Heartbleed Taught Us?
2013-12-16/a>Tom WebbThe case of Minerd
2013-08-19/a>Johannes UllrichRunning Snort on ESXi using the Distributed Switch
2012-09-02/a>Lorna HutchesonDemonstrating the value of your Intrusion Detection Program and Analysts
2012-08-16/a>Johannes UllrichA Poor Man's DNS Anomaly Detection Script
2008-11-16/a>Maarten Van HorenbeeckDetection of Trojan control channels

LAB

2018-05-24/a>Xavier Mertens"Blocked" Does Not Mean "Forget It"
2018-04-19/a>Richard PorterBack to Basics: Backups and Data Recovery "The Home Office Edition"
2017-12-14/a>Russ McReeDetection Lab: Visibility & Introspection for Defenders
2017-10-12/a>Xavier MertensVersion control tools aren't only for Developers
2012-05-30/a>Rob VandenBrinkToo Big to Fail / Too Big to Learn?
2012-05-30/a>Rob VandenBrinkWhat's in Your Lab?
2011-01-08/a>Guy BruneauPandaLabs 2010 Annual Report
2008-11-25/a>Andre LudwigThe beginnings of a collaborative approach to IDS