Detecting Long Connections With Zeek/Bro and RITA
Hello and welcome, my name is John Strand and in this video, we’re going to be talking about RITA, Real Intelligence Threat Analytics and how it can quickly do DNS […]
Hello and welcome, my name is John Strand and in this video, we’re going to be talking about RITA, Real Intelligence Threat Analytics and how it can quickly do DNS […]
Hello and welcome, my name is John Strand and in this video, we’re going to be talking a little bit about beaconing using RITA. Now, for this particular video, I’m […]
Logan Lembke// Here at BHIS, we ♥ Bro IDS. Imagine… Bro IDS Everywhere! If you haven’t encountered Bro IDS before, checkout this webcast on John’s Youtube channel discussing the need for Bro […]
John Strand // Want to get started on a hunt team and discover “bad things” on your network? In this webcast, we will walk through the installation and usage of […]
Sierra Ward // The other day I went to get some food with a co-worker. When the counter boy asked for my name I told him. The co-worker said she could […]
Marita Rasche began her time at Black Hills Information Security (BHIS) as an intern in 2016 and is now the Director of Accounting and a certified CPA. Her daily work […]
RITA Real Intelligence Threat Analytics This project, born from BHIS, is now developed, funded and supported by Active Countermeasures Download RITA here RITA on Security Weekly with John Strand John does […]
Changes to the msds-KeyCredentialLink attribute are not audited/logged with standard audit configurations. This required serious investigations and a partner firm in infosec provided us the answer: TrustedSec. So, credit where […]
This is Part Two of the blog series, Offensive IoT for Red Team Implants, so if you have not read PART ONE, I would encourage you do to so first […]