Feb. 7, 2024, 5:49 p.m. | Black Hat

Black Hat www.youtube.com

...In this talk, we will present how defenders and analysts can utilize these features in Windows to track and defend against RPC-based attacks. We will also demonstrate their effectiveness in analyzing RPC data and detecting malicious traffic. Finally, we will share signatures that we wrote to detect many common lateral movement techniques and one-days....

By: Stiv Kupchik

Full Abstract and Presentation Materials: https://www.blackhat.com/us-23/briefings/schedule/#lifting-the-fog-of-war---monitoring-identifying-and-mitigating-ms-rpc-based-threats-32792

analysts attacks can data defenders detect features fog of war malicious monitoring rpc share signatures threats track traffic war windows

Incident Response Lead

@ Blue Yonder | Hyderabad

GRC Analyst

@ Chubb | Malaysia

Information Security Manager

@ Walbec Group | Waukesha, WI, United States

Senior Executive / Manager, Security Ops (TSSQ)

@ SMRT Corporation Ltd | Singapore, SG

Senior Engineer, Cybersecurity

@ Sonova Group | Valencia (CA), United States

Consultant (Multiple Positions Available)

@ Atos | Plano, TX, US, 75093