Active Countermeasures Webcast
02-03-2021
How to Analyze Encrypted Traffic on Your Network
Bill Stearns from Active Countermeasures & Alex Kirk with Corelight have joined together to discuss analyzing encrypted network traffic. In this one-hour Active Countermeasures webcast, you will learn how to detect and analyze encrypted traffic on your network.
Presented by: Bill Stearns & Alex Kirk
Timeline:
- 00:00 – PreShow Banter™ — Name Dropping
- 05:40 – FEATURE PRESENTATION: How To Analyze Encrypted Traffic on Your Network
- 06:31 – Traffic On a Wire
- 10:54 – Common Types
- 15:31 – Unencrypted DNS Vs Encrypted DNS
- 23:21 – Encrypted DNS: Analyze Options?
- 28:59 – Encrypted Traffic in Zeek
- 35:09 – Exploit Detection in Certificates
- 37:54 – Sunburst Anomaly
- 45:44 – SSH Visibility Starts in Open Source
- 47:44 – Corelight ETC
- 51:22 – RITA & AC-Hunter
- 54:05 – References and Questions