Cyber Security Incident Response at Jenkins & Associates

3 months ago
53

Ever wondered what it's like inside the eye of the storm during a ransomware incident? How do the team members respond? What can go wrong? In our latest episode, Cyber Security Incident Response at Jenkins & Associates, we take you behind the scenes and walk you through every tense moment. From rapid decision-making to the unexpected pitfalls, discover what really happens when the clock is ticking. Don't miss it!

#CyberSecurity #IncidentResponse #Ransomware #DataBreach #CrisisManagement #ShadowTactics

Here is a list of links to the tools mentioned in the podcast scenario:

Volatility (Memory Analysis Tool)

https://www.volatilityfoundation.org
Sysinternals Suite (Endpoint Analysis)

https://docs.microsoft.com/en-us/sysinternals/
BloodHound (Active Directory Analysis)

https://github.com/BloodHoundAD/BloodHound
CrackMapExec (Post-Exploitation Tool)

https://github.com/byt3bl33d3r/CrackMapExec
Gcat (Command & Control Tool)

https://github.com/mbcrump/33c3adg/gcat
Sneaky Creeper (Command & Control Tool)

https://github.com/Allan-Nava/sneaky-creeper
Zeek (Network Threat Hunting)

https://zeek.org
RITA (Real-Time Intrusion Detection)

https://github.com/activecm/rita
JPCERT/CC (Firewall Log Review)

https://www.jpcert.or.jp
These tools are commonly used in various phases of incident response, from analysis and detection to post-exploitation and response.

Loading 1 comment...