02-03-2021 ACM Webcast: How to Analyze Encrypted Traffic on Your Network

Active Countermeasures Webcast

02-03-2021

How to Analyze Encrypted Traffic on Your Network

Bill Stearns from Active Countermeasures & Alex Kirk with Corelight have joined together to discuss analyzing encrypted network traffic. In this one-hour Active Countermeasures webcast, you will learn how to detect and analyze encrypted traffic on your network.

Download Slide Deck

Presented by: Bill Stearns & Alex Kirk

Timeline:

  • 00:00​ – PreShow Banter™ — Name Dropping
  • 05:40​ – FEATURE PRESENTATION: How To Analyze Encrypted Traffic on Your Network
  • 06:31​ – Traffic On a Wire
  • 10:54​ – Common Types
  • 15:31​ – Unencrypted DNS Vs Encrypted DNS
  • 23:21​ – Encrypted DNS: Analyze Options?
  • 28:59​ – Encrypted Traffic in Zeek
  • 35:09​ – Exploit Detection in Certificates
  • 37:54​ – Sunburst Anomaly
  • 45:44​ – SSH Visibility Starts in Open Source
  • 47:44​ – Corelight ETC
  • 51:22​ – RITA & AC-Hunter
  • 54:05​ – References and Questions
AC-Hunter Datasheet
AC-Hunter Personal Demo
What We’re up To
Archives

We're always up to cool threat hunting stuff at Active Countermeasures. Sometimes we want to share our cool stuff and we'll mail it to this list. We are not spammy, and no salesy junk!

* indicates required



Choose the Email Categories You Want to Receive:

(un-check any you don't want)


We're always up to cool threat hunting stuff at Active Countermeasures. Sometimes we want to share our cool stuff and we'll mail it to this list. We are not spammy, and no salesy junk!

* indicates required



Choose the Email Categories You Want to Receive:

(un-check any you don't want)