Full Packet Capturing with TShark for Continuous Monitoring & Threat Intel via IP, Domains, & URLS
Living in a world in which you have to assume breach, makes the thought of detecting threats more antagonizing. Compounding this agony, is a world in which we have a global pandemic and the threat actors are looking to take advantage of one of humans' most recent calamities. Since threat actors do not take time off matters the season or pandemic, it is imperative, we as defenders, have solutions in place to quickly detect their activities.
Considering the preceding, this webcast will touch on why full packet capture is important. We will provide a Python consisting of two scripts you can use to make the analysis of your packets a bit easier.
Speaker Bio
Nik Alleyne
Nik has over 18 years in IT, with the last 10 being more focused on Security. He is currently employed as a Director Business Development, for a Managed Security Services Provider (MSSP), where he is responsible for leading multiple teams supporting various security technologies including IDS/IPS, Anti-Malware tools, proxies, firewalls, SIEM, Cloud, WAF, etc. He also works with local colleges through their co-op programs, to aid in the development of their cyber security students.
Nik is author of SANS course SEC582: Mastering TShark Packet Analysis. He is also a SANS Instructor, teaching both the SEC503: Intrusion Detection In-Depth & SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling. Additionally, he also authored the book "Learning By Practicing - Hack & Detect: Leveraging the Cyber Kill Chain for Practical Hacking and its Detection via Network Forensics" and during his free time actively writes on his blog at www.securitynik.com.