Icon-Check@3x
CPE Cyber Attack Lab #1 Replay

Malware, C&C, and DNS Exfiltration

On-Demand

Watch our IR team convince a user to open an infected document, giving us a reverse shell. We'll use that connection to recon the network, run a pass-the-hash attack, and sneak some top-secret data out via DNS tunneling.

Then learn, step-by-step, how you can use Varonis to run a fast and conclusive investigation—without wasting hours stitching logs or running reports.

+1 CPE

Watch Now

About this webinar

What's behind those malicious Word macros that users just love to enable?

See how Varonis uncovers indicators of compromise at every turn as our adversary:
  • Gets their victim to open a malicious attachment
  • Drops malware via a Word macro
  • Establishes a reverse shell
  • Does network recon to find interesting hosts
  • Moves laterally and elevates privileges using pass the hash
  • Exfiltrates data via DNS tunneling
Ian McIntyre-1
Ian McIntyre Security Analyst, Varonis

Ian McIntyre is a Security Analyst on the Security Architecture and Incident Response team at Varonis. In his position at Varonis, Ian helps customers understand and implement the full scope of Varonis’ detection and alerting capabilities, as well as assisting customers through cybersecurity investigations. Specific areas of interest include training SOC teams on how to analyze and triage Varonis alerts, and building full activity timelines of suspected insider threats.

“The level of governance and insight provided by Varonis empowered our team to detect and respond to abnormalities as well as user activity and misconfigurations.”

Al Faella, CTO, Prospect Capital Management

Want to see Varonis in action?

REQUEST A DEMO