Request a Demo Contact Us
Need a Pen Test? Get Started Now!
Learn more

Profiling the Attacker – Using Offender Profiling In SOC Environments

 

It’s been said ‘‘Intrusion analysis is as much about tcpdump as astronomy is about telescopes”. Understanding who is attacking your or a customer’s network and why is just as important as analyzing the packets on it. This slot will focus on a technical offender profiling framework that can be used to build a knowledge base on malicious actors. This talk will delve into the following areas: – Building an information classification for your assets – Attack significance plotting – Attack factor comparison analysis – Discerning motive – Attacker kill chain analysis – Malicious actor profile checklist – Naming conventions for malicious actors

Best Practices for Implementing and Managing a VDP

By admin-mk, Jun 04, 2022
Read more

Practical Recon Techniques for Bug Hunters & Pen Testers

By admin-mk, Jun 05, 2022
Read more

Security Reconnaissance with Codingo: How New Tricks Let Hackers See More

By admin-mk, Jun 04, 2022
Read more

Get Started With Bugcrowd

Every minute that goes by, your unknown vulnerabilities leave you more exposed to cyber attacks.