Cloud Security Podcast cover image

Threat Hunting in AWS

Cloud Security Podcast

00:00

Common Ivasion Technice Things to Look Out for in Trap Hunting

There are two things that are almost completely under your control as an attacker. The source ip address, and the usur agent. You can create a simple alarm by using v peering to log into subnets. And there's a sorcpwhic you wouldn't expect an attacker would be able to control. But that was one of the fine hings i had. I haven't seen many attackers really making use of it but why not? It is what is supplied by the user, by the club. So other common ivasion technice people should look out for in tread hunting.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app