* Cantinho Satkeys

Refresh History
  • worrierblack: 4tj97u<z
    Hoje às 03:09
  • worrierblack: hello
    Hoje às 03:09
  • worrierblack: hello
    Hoje às 03:09
  • FELISCUNHA: Votos de um santo domingo para todo o auditório  4tj97u<z
    08 de Fevereiro de 2026, 11:39
  • j.s.: tenham um bom fim de semana,   49E09B4F 49E09B4F
    07 de Fevereiro de 2026, 14:31
  • j.s.: dgtgtr a todos  49E09B4F
    07 de Fevereiro de 2026, 14:30
  • FELISCUNHA: ghyt74  pessoall 49E09B4F
    06 de Fevereiro de 2026, 12:00
  • JPratas: try65hytr A Todos  4tj97u<z  2dgh8i k7y8j0 classic
    06 de Fevereiro de 2026, 05:17
  • joca34: ola amigos alguem tem este cd Ti Maria da Peida -  Mãe negra
    05 de Fevereiro de 2026, 16:09
  • FELISCUNHA: ghyt74  pessoal   49E09B4F
    03 de Fevereiro de 2026, 11:46
  • Robi80g: CIAO A TUTTI
    03 de Fevereiro de 2026, 10:53
  • Robi80g: THE SWAP FILM WALT DISNEY
    03 de Fevereiro de 2026, 10:50
  • Robi80g: SWAP
    03 de Fevereiro de 2026, 10:50
  • j.s.: dgtgtr a todos  49E09B4F
    02 de Fevereiro de 2026, 16:50
  • FELISCUNHA: ghyt74  pessoal   4tj97u<z
    02 de Fevereiro de 2026, 11:41
  • j.s.: try65hytr a todos  49E09B4F
    29 de Janeiro de 2026, 21:01
  • FELISCUNHA: ghyt74  pessoal  4tj97u<z
    26 de Janeiro de 2026, 11:00
  • espioca: avast vpn
    26 de Janeiro de 2026, 06:27
  • j.s.: dgtgtr  todos  49E09B4F
    25 de Janeiro de 2026, 15:36
  • Radio TugaNet: Bom Dia Gente Boa
    25 de Janeiro de 2026, 10:18

Autor Tópico: Osquery for Security Analysis  (Lida 255 vezes)

0 Membros e 1 Visitante estão a ver este tópico.

Offline mitsumi

  • Sub-Administrador
  • ****
  • Mensagens: 129146
  • Karma: +0/-0
Osquery for Security Analysis
« em: 01 de Maio de 2021, 17:11 »
MP4 | Video: h264, 1152x720 | Audio: AAC, 48000 Hz, 2 Ch
Language: English | Size: 1.07 GB | Duration: 5h 14m


Osquery for Security Analysis will teach you how to use Osquery to perform thorough investigations of hosts on your network. This isn't just an Osquery tutorial, it's a course designed to help you improve your host-based investigation skills using one of the best tools for the job.

A production server that doesn't normally communicate over the internet is exhibiting suspicious characteristics. It's sending out weird bursts of network traffic to an external host you don't know anything about. The traffic is encrypted, so network data won't be helpful. You have to rely exclusively on host-based evidence to figure out what's happening.

Now be completely honest with yourself. Would you be able to come to a conclusion about whether an attack has occurred? Would you be able to do it quickly? Would you be 100% certain about your determination?

If you answered no to any of those, then you aren't alone. The truth is, investigating things on the host is overwhelming. There are so many places to look: the registry, prefetch, disk artifacts, operating system logs...the list goes on.

The problem isn't just the number of rabbit holes, its that each one requires a different tool to access and parse the data. A question as simple as "Did the malware execute after it was downloaded?" might require a combination of a dozen complicated and unmaintained open sources tools or a pricey commercial solution.

You'll learn:

How to craft SQL queries to interrogate Windows, Linux, and MacOS hosts
Common queries for performing software inventory and asset control
Strategies for interrogating processes to determine if they are malicious
Techniques for uncovering persistence and lateral movement
Triaging suspicious systems using high-value data tables
Hunting leveraging MITRE ATT&CK techniques
Complete deployment of distributed Osquery across your network using Kolide Fleet and ElasticStack
How to leverage differential queries to monitor state changes and generate alerts
Extending Osquery with extensions


Download link:
Só visivel para registados e com resposta ao tópico.

Only visible to registered and with a reply to the topic.

Links are Interchangeable - No Password - Single Extraction