02-03-2021 ACM Webcast: How to Analyze Encrypted Traffic on Your Network

Active Countermeasures Webcast

02-03-2021

How to Analyze Encrypted Traffic on Your Network

Bill Stearns from Active Countermeasures & Alex Kirk with Corelight have joined together to discuss analyzing encrypted network traffic. In this one-hour Active Countermeasures webcast, you will learn how to detect and analyze encrypted traffic on your network.

Download Slide Deck

Presented by: Bill Stearns & Alex Kirk

Timeline:

  • 00:00​ – PreShow Banter™ — Name Dropping
  • 05:40​ – FEATURE PRESENTATION: How To Analyze Encrypted Traffic on Your Network
  • 06:31​ – Traffic On a Wire
  • 10:54​ – Common Types
  • 15:31​ – Unencrypted DNS Vs Encrypted DNS
  • 23:21​ – Encrypted DNS: Analyze Options?
  • 28:59​ – Encrypted Traffic in Zeek
  • 35:09​ – Exploit Detection in Certificates
  • 37:54​ – Sunburst Anomaly
  • 45:44​ – SSH Visibility Starts in Open Source
  • 47:44​ – Corelight ETC
  • 51:22​ – RITA & AC-Hunter
  • 54:05​ – References and Questions
AC-Hunter Datasheet
AC-Hunter Personal Demo
What We’re up To
Archives