Detection: Challenging Paradigms

Episode 6: Matt Graeber

Mar 29, 2021
Ask episode
Chapters
Transcript
Episode notes
1
Introduction
00:00 • 2min
2
Is There a Debate Around Offense Security Tools?
01:45 • 3min
3
Is Open Source a Net Bad?
04:40 • 6min
4
Is There a Right or a Wrong?
10:20 • 3min
5
Open Source Tooling
13:22 • 2min
6
Red Teaming and Detection Engineering - What's the Output?
15:16 • 2min
7
Is There a Jehari Window?
17:04 • 5min
8
Open Source Tooling Is Bad, Bro?
21:59 • 2min
9
Open Source Defensive Capabilities
23:45 • 4min
10
Is It Worth It? Or Is It the Capabilities Abundance?
27:58 • 5min
11
Can I Create Schedule Tasks Through Power Shell?
32:42 • 1min
12
Is There a Difference Between Dynamic and Static Analysis?
34:10 • 4min
13
Should I Release Defensive Capabilities?
38:09 • 2min
14
The Fundamental Aspect of the Abbreviation Map
40:00 • 5min
15
I'm Getting Too Far, Right?
45:30 • 4min
16
The Juice Isn't Worth the Squeeze
49:15 • 3min
17
Detecting a Credential Dumping From Elsas
52:03 • 4min
18
Securable Objects on the Windows Operating System
55:46 • 2min
19
Can You Detect All Curbrosting?
58:10 • 3min
20
Is There So Much That Can Be Done in Detection Engineering?
01:01:22 • 5min
21
How Do I Detect All Services?
01:06:52 • 6min
22
What Makes Something Malicious?
01:12:52 • 5min
23
Is the Service Desecrated Remotely?
01:17:40 • 2min
24
Detection Engineering - You Don't Want to Look at Every Ten, Right?
01:19:54 • 2min
25
Detection Engineer - I Hate That I'm About to Say This
01:22:06 • 4min
26
Is There a Way to Reduce False Negatives?
01:26:00 • 5min
27
The Dutis Off the Walls
01:30:46 • 3min