Adversary Infrastructure Tracking with Mihari - Manabu Niseki - Recon Village @DEFCON 29
DEF CON 29 Recon Village - Manabu Niseki - Adversary Infrastructure Tracking with Mihari
Uncovering and Visualizing Malicious Infrastructure - SANS Threat Hunting Summit 2018
Adversary-Threat Infrastructure: Threat Actor Profiles and Tools
The Only Constant is Change: Tracking Adversary Trends | STAR Webcast
0x43 - Adversary Infrastructure Report 2021: Back to Bots / Greg Lesnewich
Cyber Threat Workshop - Adversary Attribution: Fingerprint Adversary-Threat Infrastructure
Upgrading Your CTI to Track Down Criminal Hosting Infrastructures - SANS CTI Summit 2018
Hunting The Adversary with John Bambenek - secwest.net/dojos/hunting-the-adversary
OBTS v3.0: "Mimic in Configuration" - Manabu Niseki / Suguru Ishimaru
Practical Infrastructure Automation For Red Teams
Using Passive DNS for gathering Business Intelligence - Andy Dennis - Recon Village @DEFCON 29
DEF CON 26 RECON VILLAGE - Undisclosed - Targeted User Analytics and Human Honeypots
DEF CON 29 - Rex Guo, Junyuan Zeng - Phantom Attack: Evading System Call Monitoring
DEF Con 401 May 2020 - Rae Baker - OSINT Tools, Tips & Methodology
DEF CON 29 Recon Village - Anthony Kava - GOV Doppelgänger Your Häx Dollars at Work
Internet Controlled Helmet [with JRWR] | DEF CON 29
Watch DEFCON 29 Lock Pick Village Videos
UNSECURITY Episode 143: DEF CON 29 Recap with Team Ambush
DEF CON 29 Recon Village - Ladislav Baco - How Vigilant Researchers Can Uncover APT Attacks