Detection Rules Coverage

Red Team Lead
Jan. 10, 2020
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
Detection Rules Coverage
1 of 69

More Related Content

What's hot

Hunting for Privilege Escalation in Windows EnvironmentHunting for Privilege Escalation in Windows Environment
Hunting for Privilege Escalation in Windows EnvironmentTeymur Kheirkhabarov
Hunting for Credentials Dumping in Windows EnvironmentHunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows EnvironmentTeymur Kheirkhabarov
A Threat Hunter HimselfA Threat Hunter Himself
A Threat Hunter HimselfTeymur Kheirkhabarov
Bsides 2019 - Intelligent Threat HuntingBsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat HuntingDhruv Majumdar
Threat hunting - Every day is hunting seasonThreat hunting - Every day is hunting season
Threat hunting - Every day is hunting seasonBen Boyd
You can detect PowerShell attacksYou can detect PowerShell attacks
You can detect PowerShell attacksMichael Gough

Similar to Detection Rules Coverage

Breach and attack simulation toolsBreach and attack simulation tools
Breach and attack simulation toolsBangladesh Network Operators Group
SignaturesAreDead Long Live RESILIENT SignaturesSignaturesAreDead Long Live RESILIENT Signatures
SignaturesAreDead Long Live RESILIENT SignaturesDaniel Bohannon
MITRE AttACK framework it is time you took notice_v1.0MITRE AttACK framework it is time you took notice_v1.0
MITRE AttACK framework it is time you took notice_v1.0Michael Gough
Luncheon 2016-01-21 - Emerging Threats and Strategies for Defense by Paul Fle...Luncheon 2016-01-21 - Emerging Threats and Strategies for Defense by Paul Fle...
Luncheon 2016-01-21 - Emerging Threats and Strategies for Defense by Paul Fle...North Texas Chapter of the ISSA
EmPOW: Integrating Attack Behavior Intelligence into Logstash PluginsEmPOW: Integrating Attack Behavior Intelligence into Logstash Plugins
EmPOW: Integrating Attack Behavior Intelligence into Logstash PluginsFaithWestdorp
Top10 Characteristics of Awesome AppsTop10 Characteristics of Awesome Apps
Top10 Characteristics of Awesome AppsCasey Lee

Similar to Detection Rules Coverage(20)

Recently uploaded

the effect of phone electromagnetig  waves on the body  ;docxthe effect of phone electromagnetig  waves on the body  ;docx
the effect of phone electromagnetig waves on the body ;docxHimRong
apidays London 2023 - Open Standards, AI and Data for better business decisio...apidays London 2023 - Open Standards, AI and Data for better business decisio...
apidays London 2023 - Open Standards, AI and Data for better business decisio...apidays
apidays London 2023 - DocOps and Automation in Fintech, Kateryna Osadchenko, ...apidays London 2023 - DocOps and Automation in Fintech, Kateryna Osadchenko, ...
apidays London 2023 - DocOps and Automation in Fintech, Kateryna Osadchenko, ...apidays
 Proposal Presentation Proposal Presentation
Proposal PresentationSolarBhai
HR ANALYSIS pdf.pdfHR ANALYSIS pdf.pdf
HR ANALYSIS pdf.pdfMehakSethi19
apidays London 2023 - Let's make "true" impact happen!, Sandra Sydow, Climate...apidays London 2023 - Let's make "true" impact happen!, Sandra Sydow, Climate...
apidays London 2023 - Let's make "true" impact happen!, Sandra Sydow, Climate...apidays

Recently uploaded(20)

Detection Rules Coverage

Editor's Notes

  1. To update
  2. https://medium.com/mitre-attack/how-to-be-a-savvy-attack-consumer-63e45b8e94c9 https://www.mitre.org/sites/default/files/publications/mitre-getting-started-with-attack-october-2019.pdf https://medium.com/mitre-attack/using-att-ck-to-advance-cyber-threat-intelligence-part-2-6f21fdba80c
  3. https://medium.com/mitre-attack/how-to-be-a-savvy-attack-consumer-63e45b8e94c9 https://www.mitre.org/sites/default/files/publications/mitre-getting-started-with-attack-october-2019.pdf https://medium.com/mitre-attack/using-att-ck-to-advance-cyber-threat-intelligence-part-2-6f21fdba80c
  4. REf
  5. REf
  6. No optics on the state of the machines/images when configured manually
  7. splunk stop splunk clean eventdata -index yourindex splunk start
  8. https://car.mitre.org/analytics/CAR-2013-04-002/ Sigma Rules
  9. https://car.mitre.org/analytics/CAR-2013-04-002/
  10. Some techniques do not need alerts as well