accent 1 accent 2
Icon-Check@3x
CPE Cyber Attack Lab #1

Malware, C&C, and DNS Exfiltration

Mon, January 25 | 3:00 pm EST

Watch our IR team convince a user to open an infected document, giving us a reverse shell. We'll use that connection to recon the network, run a pass-the-hash attack, and sneak some top-secret data out via DNS tunneling.

Then learn, step-by-step, how you can use Varonis to run a fast and conclusive investigation—without wasting hours stitching logs or running reports.

+1 CPE

Register Now

About this webinar

What's behind those malicious Word macros that users just love to enable?

See how Varonis uncovers indicators of compromise at every turn as our adversary:
  • Gets their victim to open a malicious attachment
  • Drops malware via a Word macro
  • Establishes a reverse shell
  • Does network recon to find interesting hosts
  • Moves laterally and elevates privileges using pass the hash
  • Exfiltrates data via DNS tunneling
 Raphael Kelly
Raphael Kelly Datalert Operation Manager, Varonis

Raphael Kelly, GCIH is a Team Lead for the Incident Response and Security Architecture team at Varonis. Raphael has an consulting and automation background with experience in IT infrastructure, Incident Response, and Data Protection. Varonis’ team of security professionals provide complementary Incident Response services to all existing customers. In addition, they work with customers to operationalize the Varonis Data Security Platform and integrate Varonis into the security ecosystem.

"A few months ago, a non-HR user opened up an HR folder that contained sensitive employee salary information. With Varonis, I was able to track down the user and review exactly what they had accessed and changed."

Infrastructure Manager, US Federal Credit Union

Want to see Varonis in action?

REQUEST A DEMO