pass-the-hash

 

ON DEMAND WEBCAST

Find lateral movement with Zeek and MITRE ATT&CK

You will discover how to:

  • Find pass the hash attacks where attackers authenticate without the user's cleartext password
  • Spot attempts to gain unauthorized interactive access to workstations and servers via RDP
  • Monitor FTP for potential transfers of malicious toolkits into your environment

Speakers

Vince Stoffer

Field CTO, Corelight

Vince Stoffer is Field CTO at Corelight and previously held security engineering and network management positions at Lawrence Berkeley National Laboratory and before that served as a network security engineer at Reed College. Vince holds the CISSP, GCIH and GCIA certifications.

Mark Overholser

Sales Engineer, Corelight

Mark Overholser is a Security Engineer at Corelight where he helps organizations capture, interpret, and connect network security data. Mark brings more than twelve years experience in security, system administration, and infrastructure. Prior to Corelight, Mark was a Systems Engineer Specialist at Palo Alto Networks, a Consulting Engineer at LightCyber, and Information Security Team Lead at Medline Industries.