Exploiting Your Adversary’s Weak Spot: DNS Domain Names – A Natural Fit for SOAR

Webinar Registration

Sometimes it feels like the bad guys hold all the cards, but they have weak spots too. We just have to know where to look. For instance, most attack scenarios require early on that the attacker gain persistence and it’s very difficult to do that without making a sound. But here’s another example: bad guys widely rely on DNS and domain names just like everyone else.

In most attack scenarios, bad guys have to stand up some infrastructure to host things like staging, command and control, and exfiltration destinations. To varying degrees, attackers may use compromised assets of other unwitting organizations or infrastructure they directly control. But they have to be ready to move when their virtual hideout is discovered, shutdown or added to a threat intel list. That means the IP addresses of their C&C servers and related infrastructure may change frequently. So, they use the same technology everyone else uses to find the current IP address for a given resource – domain names.

Even if they didn’t have to worry about IP addresses changing, it’s difficult to stay under the radar if your phishing emails and other links are bare IP addresses. That just looks weird.  

So, the bad guys rely on DNS and domain names just as much as the honest world. And that’s a weak spot we can exploit.  

In this real training for free event, I will provide an overview of the important role DNS and domain names play in today’s attack scenarios and explore proven risk factors for predicting the threat potential of a domain name that comes across your radar, whether from a DNS server log, phishing email or any of many other log sources. We will look at how to interpret:

  • When was the domain registered?
  • How many other domains share characteristics with this domain?
  • What is the email/website infrastructure for the domain?
  • Learning from older malicious domains to recognize new ones

But no organization can manually assess every domain name, and that’s where Security Orchestration and Automation come in to play. Our sponsor, DomainTools, is a leader in domain name risk analysis and will briefly show how they are working with SIEM, UEBA and other partners to accelerate threat detection with real world SOAR scenarios.

Please join us for this real training for free event.

First Name:   
Last Name:   
Work Email:  
Job Title:  
Zip/Postal Code:  

Your information will be shared with the sponsor.

By clicking "Submit", you're agreeing to our Privacy Policy and consenting to be contacted by us and the sponsor.



Upcoming Webinars
    Additional Resources