SEC504: Hacker Tools, Techniques, and Incident Handling

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.
Microsoftは、様々なシングルサインオン(SSO)のシステムをユーザーに提供しています。しかし、SSO のために利用されるクレデンシャル情報は、長い間攻撃者に狙われてきました。Pass the HashやPass the Ticket、Pass the Tokenなどの攻撃により、攻撃者はオンプレミス環境のみならずクラウド環境へまでも、ネットワークアクセスができるようになることがあります。これらの攻撃の詳細や、関連するリスクを軽減するための最新のコントロールについて紹介します。
Microsoft provides users with the convenience of single-sign-on (SSO) solutions. But the authorization credentials upon which SSO relies have long been targeted by attackers. Pass-the-hash, pass-the-ticket, pass-the-token, and other attacks allow attackers to move freely about your network, even between your on-prem and cloud environments. Learn more about these attacks and the latest controls to mitigate their associated risk.
How do you mitigate a 10 minute cloud-native cyber attack? Automation is your only chance. Did you hear about SOAR (Security Orchestration Automation and Response) in 2014? It only took 10 years to be propelled into relevance by the technical innovation of public cloud infrastructure! Come and watch our industry experts show you how it's done, so you can keep your cloud-speed business innovation secure from cloud-speed exploitation.
Public cloud adoption enables digital transformation at scale, driving a massive influx in cloud-based workloads hosting sensitive communications and data with SaaS applications or workloads in multiple public clouds or data centers.As a result, securing these mission-critical workloads is vital for enterprises to ensure their continued success and protect sensitive data. However, legacy architectures are inadequate to secure egress traffic from public cloud workloads, amplifying lateral movement, increasing operational complexity and cost, and creating inconsistent threat and data protection.
Securing applications is a complex and cumbersome issue many organizations have yet to solve. Current processes to test and secure applications are manual, ad-hoc, and often disconnected from development cycles. Furthermore, testing tools or results are siloed, and may not focus on overall risk or lack enterprise context. This leads to unnecessary friction, which can impact development processes or leave a security gap in the organization.
What a difference a year can make! Looking back on 2023, we saw some stunning trends and incidents in the realm of cybersecurity that got us all talking. In this webcast (with an associated white paper), SANS Senior Instructor Dave Shackleford will examine:The most significant cybersecurity incidents in 2023, and lessons learned from themWhat’s happening in the realm of machine learning and AI, both good and badNew security technology trends worth noting, and how they can help us improve overallWe’ve all lived through 2023, so register for this webcast now to take a look back at what we learned—and where to go next!
Adversaries carrying out cyber attacks can have a range of motivations. Understanding these motivations enables network defenders to prioritize their limited time and resources.
Learn about five timeless trends that security leaders and CISOs must constantly keep in mind to improve their security programs, their teams, and themselves.
Recent news of vulnerabilities in hardware appliances firmware such as Ivanti and Fortinet highlight the difficulty of securing complex digital supply chains. Having an in-depth understanding of what you put on your network is vital to implementing a zero-trust approach and managing risk appropriately.
On part 6 of the series we learned about the anatomy of executable images and parsing PE headers. We will continue with PE parsing and will explore a few more interesting areas of a PE file.
In this engaging session, participants will have the opportunity to delve into the world of incident response alongside SANS Instructor Phill Moore. Drawing from his wealth of experience, Phill will not only address inquiries surrounding the intricacies of being an incident responder but will also enrich the discussion with insightful anecdotes and real-world scenarios.
We know that the threat landscape is ever-changing and that organizations are constantly looking for technologies and tools to help guide and augment their security efforts. In this survey, we look at spending habits, priorities, and decision-making processes when it comes to security technology. What drives organizations to spend the way they do? Is it risk factors, compliance needs, or looking to defend against the latest threats? Furthermore, how do we determine whether these investments have returned the expected ROI?