
Sign up to save your podcasts
Or


Learn how to use Windows Event Logs to catch attackers in your network, including domain admin group enumeration and mimikatz attacks! Justin Henderson (@SecurityMapper) categorizes these techniques as "reverse attack analysis for detection" and shows us how to do it in this technical segment! References to Mark Baggett's work on freq.py are made as well (https://isc.sans.edu/forums/diary/Detecting+Random+Finding+Algorithmically+chosen+DNS+names+DGA/19893/)
Full Show Notes: https://wiki.securityweekly.com/Episode519
Security Weekly Web Site: http://securityweekly.com
Follow us on Twitter: @securityweekly
By Paul Asadoorian5
22 ratings
Learn how to use Windows Event Logs to catch attackers in your network, including domain admin group enumeration and mimikatz attacks! Justin Henderson (@SecurityMapper) categorizes these techniques as "reverse attack analysis for detection" and shows us how to do it in this technical segment! References to Mark Baggett's work on freq.py are made as well (https://isc.sans.edu/forums/diary/Detecting+Random+Finding+Algorithmically+chosen+DNS+names+DGA/19893/)
Full Show Notes: https://wiki.securityweekly.com/Episode519
Security Weekly Web Site: http://securityweekly.com
Follow us on Twitter: @securityweekly

2,011 Listeners

363 Listeners

148 Listeners

83 Listeners

79 Listeners

651 Listeners

5 Listeners

8,077 Listeners

51 Listeners

315 Listeners
![Talkin' Bout [Infosec] News by Black Hills Information Security](https://podcast-api-images.s3.amazonaws.com/corona/show/516141/logo_300x300.jpeg)
94 Listeners

139 Listeners

168 Listeners