(Full) Detection Engineering from cmd ping Watch Video
Preview(s):
Gallery
Gallery
Gallery
Play Video: (Note: The default playback of the video is HD VERSION. If your browser is buffering the video slowly, please play the REGULAR MP4 VERSION or Open The Video below for better experience. Thank you!)
Description: While we are building on findings from our previous videos in this series, our objectives have shifted; namely we are aiming to develop queries which will allow us to discover threat actor activity on a proactive basis.nnData Source:nhttps://github.com/KC7-Foundation/kc7_data/tree/main/envolvelabsnnFaux- Intelligence Report:nhttps://github.com/kkneomis/kc7_data/raw/main/envolvelabs/EnvolveLabs%20Training%20Guide%20(Intermediate).pdfnnnIn support of this goal we will not be focusing expressly on
Play Video: (Note: The default playback of the video is HD VERSION. If your browser is buffering the video slowly, please play the REGULAR MP4 VERSION or Open The Video below for better experience. Thank you!)