SlideShare a Scribd company logo
Counter reconnaissance
Basic profile Reconnaissance Open sources
“Internal” and other privileged sources Attack DoS
Intrusion
Counter reconnaissance Purpose Know that they are looking, before they break in. Result of good counter reconnaissance Determine methodology
Gather evidence
Prevention
Supply false information
Log, logs, logs, logs Huge amounts of information. Use it! (Daily?)

More Related Content

PDF
Windows Threat Hunting
PDF
Sophos intercept-x
PPTX
Hunting before a Known Incident
PPTX
Ready set hack
PDF
PHDays 2018 Threat Hunting Hands-On Lab
PPTX
Intrusion detection using data mining
ODP
Itt2 its introduction
ODP
Itet2 its authorative sources
Windows Threat Hunting
Sophos intercept-x
Hunting before a Known Incident
Ready set hack
PHDays 2018 Threat Hunting Hands-On Lab
Intrusion detection using data mining
Itt2 its introduction
Itet2 its authorative sources

Viewers also liked (13)

ODP
Itt3 its acl
ODP
Itet3 its forensics
ODP
ITET3 ITS governance
ODP
ITET1 Routing Application layer.odp
ODP
Its presentation
ODP
ITET3 Networking P2P
ODP
Routing vlans
PDF
Itt2 its ssl and services
ODP
Diagram cookbook
PDF
Itt1 intro knowing and doing
PDF
Itt1 intro project management
ODP
Itt3 virtual machines
ODP
ITET1 Routing Transport layer.odp
Itt3 its acl
Itet3 its forensics
ITET3 ITS governance
ITET1 Routing Application layer.odp
Its presentation
ITET3 Networking P2P
Routing vlans
Itt2 its ssl and services
Diagram cookbook
Itt1 intro knowing and doing
Itt1 intro project management
Itt3 virtual machines
ITET1 Routing Transport layer.odp
Ad

Similar to Itet2 its counter recon (20)

DOCX
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prev.docx
PPTX
Cyber Security Project : Comprehensive Vulnerability Analysis Report.pptx
PPTX
Tools and Methods of Reconnaissance in Cybersecurity: A Comprehensive Guide b...
PDF
CONFidence 2017: Hackers vs SOC - 12 hours to break in, 250 days to detect (G...
PDF
OSINT for Attack and Defense
PPTX
The basics of hacking and penetration testing 이제 시작이야 해킹과 침투 테스트 kenneth.s.kwon
ODP
Unlock Security Insight from Machine Data
PPTX
Cyber Security Project Presentation: Unveiling Reconnaissance Tools and Techn...
PPTX
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
PPTX
How to Leverage Log Data for Effective Threat Detection
PPTX
2. Footprinting and scanning and its sequence.pptx
PPT
Hacking Fundamentals - Jen Johnson , Miria Grunick
PPTX
Cyber Security Project Presentation : Essential Reconnaissance Tools and Tech...
PDF
DOCX
Sessiontask1_PASSIVE_RECONNAISSANCE.docx
PPT
How hackers attack networks
PPTX
Basic ethical hacking and cyber security
PPT
Log Mining: Beyond Log Analysis
PPTX
SpiceWorks Webinar: Whose logs, what logs, why logs
UMUC Monitoring, Auditing, Intrusion Detection, Intrusion Prev.docx
Cyber Security Project : Comprehensive Vulnerability Analysis Report.pptx
Tools and Methods of Reconnaissance in Cybersecurity: A Comprehensive Guide b...
CONFidence 2017: Hackers vs SOC - 12 hours to break in, 250 days to detect (G...
OSINT for Attack and Defense
The basics of hacking and penetration testing 이제 시작이야 해킹과 침투 테스트 kenneth.s.kwon
Unlock Security Insight from Machine Data
Cyber Security Project Presentation: Unveiling Reconnaissance Tools and Techn...
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
How to Leverage Log Data for Effective Threat Detection
2. Footprinting and scanning and its sequence.pptx
Hacking Fundamentals - Jen Johnson , Miria Grunick
Cyber Security Project Presentation : Essential Reconnaissance Tools and Tech...
Sessiontask1_PASSIVE_RECONNAISSANCE.docx
How hackers attack networks
Basic ethical hacking and cyber security
Log Mining: Beyond Log Analysis
SpiceWorks Webinar: Whose logs, what logs, why logs
Ad

More from Morten Nielsen (9)

PDF
Itt2 its pki and certificates
ODP
Itt2 its ids
ODP
Itt2 its encrypted storage
PDF
Itt2 its introduction
ODP
Itt1 sd requirements
ODP
Itt1 sd uml and oo
ODP
Itt3 its social engineering
ODP
Itet2 its social engineering
ODP
Itet2 its anatomy
Itt2 its pki and certificates
Itt2 its ids
Itt2 its encrypted storage
Itt2 its introduction
Itt1 sd requirements
Itt1 sd uml and oo
Itt3 its social engineering
Itet2 its social engineering
Itet2 its anatomy

Recently uploaded (20)

PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PPTX
1. Introduction to Computer Programming.pptx
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
TLE Review Electricity (Electricity).pptx
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Getting Started with Data Integration: FME Form 101
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
A comparative analysis of optical character recognition models for extracting...
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Unlocking AI with Model Context Protocol (MCP)
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
A comparative study of natural language inference in Swahili using monolingua...
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
MIND Revenue Release Quarter 2 2025 Press Release
Zenith AI: Advanced Artificial Intelligence
Web App vs Mobile App What Should You Build First.pdf
Accuracy of neural networks in brain wave diagnosis of schizophrenia
1. Introduction to Computer Programming.pptx
Heart disease approach using modified random forest and particle swarm optimi...
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
TLE Review Electricity (Electricity).pptx
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Getting Started with Data Integration: FME Form 101
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Assigned Numbers - 2025 - Bluetooth® Document
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
A comparative analysis of optical character recognition models for extracting...

Itet2 its counter recon