accent 1 accent 2
Icon-Check@3x
Cyber Attack Lab #1

Malware, C&C, and DNS Exfiltration

Friday, July 2nd | 9:00 am ET

What's behind those malicious Word macros that users just love to enable?

 

Watch our IR team convince a user to open an infected document, giving us a reverse shell. We'll use that connection to recon the network, run a pass-the-hash attack, and sneak some top-secret data out via DNS tunneling.

 

Then learn, step-by-step, how you can use Varonis to run a fast and conclusive investigation—without wasting hours stitching logs or running reports.

+1 CPE

Register Now

About this webinar

See how Varonis uncovers indicators of compromise at every turn as our adversary:

  • Gets their victim to open a malicious attachment
  • Drops malware via a Word macro
  • Establishes a reverse shell
  • Does network recon to find interesting hosts
  • Moves laterally and elevates privileges using pass the hash
  • Exfiltrates data via DNS tunneling
Ian Levy
Ian Levy Security Analytics Manager, Varonis

Ian Levy is a Senior Security Analyst on the Incident Response and Security Architecture teams where every day they help organizations detect and respond to cyber threats. Having worked in the retail sector and being network-focused engineer for many years, Ian works to help organizations proactively reduce their risk posture and aids in protecting mission critical systems while safeguarding sensitive data. Ian graduated from Pennsylvania State University and majored in Information Sciences with a minor in Security and Risk Assessment.

“It is comforting to know we have something always watching our file servers for unauthorized activity.

Jay Attiya, Director of IT

Want to see Varonis in action?

REQUEST A DEMO