Adversary Infrastructure Tracking with Mihari - Manabu Niseki - Recon Village @DEFCON 29
DEF CON 29 Recon Village - Manabu Niseki - Adversary Infrastructure Tracking with Mihari
Uncovering and Visualizing Malicious Infrastructure - SANS Threat Hunting Summit 2018
The Only Constant is Change: Tracking Adversary Trends | STAR Webcast
0x43 - Adversary Infrastructure Report 2021: Back to Bots / Greg Lesnewich
Cyber Threat Workshop - Adversary Attribution: Fingerprint Adversary-Threat Infrastructure
Upgrading Your CTI to Track Down Criminal Hosting Infrastructures - SANS CTI Summit 2018
CobaltBus: Cobalt Strike C2 Traffic Via Azure Servicebus
Lifting the Fog: Cyber Threat Intel (CTI) and Threat Discovery
Hunting The Adversary with John Bambenek - secwest.net/dojos/hunting-the-adversary
[DEF CON 29] Consider The (Data) Source: A Journey Through an Industrial Attack
DEF CON 29 Recon Village - Rae - Using OSINT to Aid in Human Trafficking and Smuggling Cases
On Adversarial Testing of Cellular Network Protocols
LIVE at Defcon29 w/ Francisco Cabañas aka ArticMine! EPI #173
Using Passive DNS for gathering Business Intelligence - Andy Dennis - Recon Village @DEFCON 29
DEF CON 29 Recon Village - Ladislav Baco - How Vigilant Researchers Can Uncover APT Attacks
DEF CON 29 ICS Village - Meet Can Kilic - Do We Really Want to Live in the Cyberpunk World
Watch DEFCON 29 Lock Pick Village Videos
DEF CON 29 - Rex Guo, Junyuan Zeng - Phantom Attack: Evading System Call Monitoring
Andy Piazza - Career Escalation Techniques - DEF CON 29 Career Hacking Village
OBTS v3.0: "Mimic in Configuration" - Manabu Niseki / Suguru Ishimaru
DEF CON 29 Recon Village - Andy Dennis - Using Passive DNS for gathering Business Intelligence
GoDaddy Investigation Showed Years-long Intrusion
DEF CON 29 Recon Village - Kala Kinyon - OSINT for Sex Workers
DEF CON 26 RECON VILLAGE - Undisclosed - Targeted User Analytics and Human Honeypots