Weaponizing the Deep Web | SANS OSINT Summit 2020

Ғылым және технология

There’s a lot of talk about data breaches but not much is discussed about where the data ends up and how it can be used for good. In this low-key talk, we’ll discuss where breach data ends up, how you can find copies of it, and most importantly, how you can use it to further your security goals. We’ll discuss how it can benefit blue teams/threat intel shops, pen testers, OSINT researchers and even DFIR practitioners.
Matt Edmondson @matt0177, Certified Instructor, SANS Institute
View upcoming Summits: www.sans.org/u/DuS

Пікірлер: 12

  • @n.trstenjak2499
    @n.trstenjak24993 жыл бұрын

    "What's La Quinta in English? Next to Denny's." LOL, I wish my profs were that funny in their lectures.

  • @mandalorian2010
    @mandalorian20104 жыл бұрын

    Why is the audio so terribly quiet? Can it not be boosted???

  • @nicolaslaborie5015
    @nicolaslaborie50154 жыл бұрын

    Thanks for this. I'm no expert but plenty of people would suggest @11:40s to run DIRECTLY grep or findstr instead of piping. We DON'T NEED to cat / type before. ^^

  • @MrAvidLearner
    @MrAvidLearner2 жыл бұрын

    This guy’s great

  • @greatwhiteswag
    @greatwhiteswag2 жыл бұрын

    This dude cracks me up

  • @oliversiewers646
    @oliversiewers6462 жыл бұрын

    15:44 Two minutes for an index search seems really slow. Ran a test once with around a billion or two mail addresses, built a proper index and clustered the data. Got it down to ~70ms uncached on HDDs. But yes it's a real pain parsing the trash of the dumped databases. Encoding is hard xD

  • @brettlaw920
    @brettlaw9204 жыл бұрын

    Poor man's big data.

Келесі