December 25, 2019

202 words 1 min read

Mapping adversary infrastructure using DNS

Mapping adversary infrastructure using DNS

Nothing good or bad can happen on the Internet without involving the Domain Name System (DNS), which provides visibility of the global Internet and unparalleled intelligence on cybercriminals and attack methods. Merike Ko discusses the value of DNS to cyber investigations and explores how real-time DNS observations can improve accuracy and response time to cyberattacks.

Talk Title Mapping adversary infrastructure using DNS
Speakers
Conference O’Reilly Security Conference
Conf Tag Build better defenses
Location Amsterdam, Netherlands
Date November 9-11, 2016
URL Talk Page
Slides Talk Slides
Video

Nothing good or bad can happen on the Internet without involving the Domain Name System (DNS). DNS offers a commanding view of both the local and global Internet and can provide unparalleled intelligence on cybercriminals and their attack methods. During investigations, incident response professionals are increasingly using DNS to build out indicators of compromise (IOC)s and other threat indicators to map the attackers’ entries and lateral movements throughout their networks. Merike Käo shares the latest insights on the value of DNS to today’s cyber investigations as well as real-world examples of how incident responders, SOC analysts, and more are using real-time global DNS observations to significantly improve response time and accuracy to today’s cyberattacks. Topics include:

comments powered by Disqus