4.9 • 696 Ratings
🗓️ 1 November 2016
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Tuesday, November 1st, 2016 edition of the Sands and its Storm Center's Stormcast. |
0:08.3 | My name is Johannes Ulrich, and then I'm recording from Jacksonville, Florida. |
0:13.1 | Yesterday I talked about volatility bot and how it can be used to automate the first phase of your malware analysis. |
0:21.6 | Now today we got Russ's approach to automating the initial instant response on Windows system. |
0:30.6 | One script that Russ introduces here is Snapshot.PS1. |
0:35.6 | It was actually written by Jason Fawson, who is the instructor for our Windows |
0:41.3 | class, and it comes as part of his class. It's really an extendable script that you can use |
0:47.1 | to add your own little tools and so to it. But what it does and what it intends to do is |
0:52.8 | sort of collect the most commonly requested artifacts from potentially compromised systems. |
1:00.0 | Of course, not everything that you want and need to do with incident response is in this one simple PowerShell script. |
1:08.0 | But as a first step, just to secure some evidence quickly, do some |
1:14.1 | initial triage. Scripts like this are certainly quite helpful. Domain name reputation lists |
1:22.1 | are certainly a hot topic and something that you can procure from various threat intelligent feats but the problem |
1:30.7 | with these feeds typically is that they operate in hindsight they first have to observe |
1:36.5 | these domains and then figure out that they're being used maliciously and then they |
1:40.7 | essentially blacklist those domains or assign them a certain risk score. |
1:47.0 | A new paper that was now presented at the ACM meeting does outline a technique where they actually |
1:54.8 | try to figure out if a domain will be used maliciously at the time at which it's registered. What they're doing is they're |
2:03.4 | essentially looking at a bunch of different data that's collected when the domain is registered, |
2:09.5 | for example, what name server will be used with it, with information, but also things that |
2:15.6 | kind of surprised me, like for example, the time of day. |
2:18.7 | Turns out that a lot of malicious domains are registered at a certain time of day, which I guess |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.