What Event Logs? Part 1: Attacker Tricks to Remove Event Logs

Поділитися
Вставка
  • Опубліковано 26 вер 2024

КОМЕНТАРІ • 7

  • @moretwocome21
    @moretwocome21 2 роки тому

    Very good presentation!

  • @Ichinin
    @Ichinin 6 років тому +3

    12:46
    Minimum size is 1024k and can be set to any multiple of 64k. There are many other ways to detect, prevent and mitigate these attacks: whatever the attacker do, the defender can do too.

  • @joyramsarkar9212
    @joyramsarkar9212 2 роки тому

    Very good sir...its informative

  • @joebrown-w6q
    @joebrown-w6q 2 дні тому

    Is there a way you can see when logs were deleted? I noticed about a week or two ago. When I went to event viewer in security logs I saw my laptop turn on when I was not even using it! Tonight, I went on to check logs and it didn't even go past the previous day. I turned it off and back on, now I can see past today. Whats going on, can anyone help?

  • @zzsql
    @zzsql 5 місяців тому

    Sounds like the speaker is dialed in on a cell phone. Use VOIP next time so you're clear and easy to understand please.

  • @nikseetharaman2008
    @nikseetharaman2008 6 років тому

    Q&A was highly disappointing - he was unable to answer basic detections questions about the very tactics he brings up.

    • @Erin-bc8ic
      @Erin-bc8ic 5 років тому +7

      A lot of them seemed very edge-case and niche. Wouldn't expect the presenter to know every single path and scenario. They should ask some better questions next time.