Weaponizing the Deep Web | SANS OSINT Summit 2020
Ғылым және технология
There’s a lot of talk about data breaches but not much is discussed about where the data ends up and how it can be used for good. In this low-key talk, we’ll discuss where breach data ends up, how you can find copies of it, and most importantly, how you can use it to further your security goals. We’ll discuss how it can benefit blue teams/threat intel shops, pen testers, OSINT researchers and even DFIR practitioners.
Matt Edmondson @matt0177, Certified Instructor, SANS Institute
View upcoming Summits: www.sans.org/u/DuS
Пікірлер: 12
"What's La Quinta in English? Next to Denny's." LOL, I wish my profs were that funny in their lectures.
Why is the audio so terribly quiet? Can it not be boosted???
Thanks for this. I'm no expert but plenty of people would suggest @11:40s to run DIRECTLY grep or findstr instead of piping. We DON'T NEED to cat / type before. ^^
This guy’s great
This dude cracks me up
15:44 Two minutes for an index search seems really slow. Ran a test once with around a billion or two mail addresses, built a proper index and clustered the data. Got it down to ~70ms uncached on HDDs. But yes it's a real pain parsing the trash of the dumped databases. Encoding is hard xD
Poor man's big data.