Skip to content
Sandfly Security
  • Product
    • Why Sandfly
    • How Sandfly Works
    • Operation
    • Threats Detected
    • FAQ
    • Testimonials
  • Case Studies
    • University of Massachusetts
    • Testimonials
  • Pricing
  • Resources
    • Blog
    • Videos
    • Documentation
  • About Us
    • About Us
    • Privacy Policy
  • Contact Us
  • TRY IT
Sandfly Security
  • Product
    • Why Sandfly
    • How Sandfly Works
    • Operation
    • Threats Detected
    • FAQ
    • Testimonials
  • Case Studies
    • University of Massachusetts
    • Testimonials
  • Pricing
  • Resources
    • Blog
    • Videos
    • Documentation
  • About Us
    • About Us
    • Privacy Policy
  • Contact Us
  • TRY IT

videos

Using Elasticsearch and Kibana to Investigate Suspicious Linux Activity with Sandfly

May 28, 2020

In this video we’re going to show you how to use Sandfly with Elasticsearch Kibana dashboards to search for and investigate a suspicious process on Linux. We’ll go over Sandfly’s agentless collection of Linux operating …

READ MOREUsing Elasticsearch and Kibana to Investigate Suspicious Linux Activity with Sandfly

Categories linux forensics, videos Tags videos

Using Linux Process Environment Variables for Live Forensics

May 6, 2019

In this post and video we’re going to explore the Linux /proc directory further by digging into a live process and the environment variables it presents. The basic format for the command we’ll use is …

READ MOREUsing Linux Process Environment Variables for Live Forensics

Categories computer forensics, linux forensics, videos Tags linux forensics, videos

The Advantages of Agentless Security and Intrusion Detection for Linux

March 7, 2019

In this video Sandfly founder Craig Rowland talks about agentless vs. agent based security for Linux. He’ll discuss why agentless approaches are better for compatibility and stability on Linux. Plus, he’ll discuss why agentless security …

READ MOREThe Advantages of Agentless Security and Intrusion Detection for Linux

Categories videos Tags videos

Using Command Line Tools to Find Process Masquerading Linux Malware

February 28, 2019

In this video Sandfly founder Craig Rowland goes over the basics behind using command line tools on Linux to look into a suspicious process. You’ll learn how to start a benign process and have it …

READ MOREUsing Command Line Tools to Find Process Masquerading Linux Malware

Categories linux forensics, videos Tags incident response, linux forensics, videos

Why You Must Monitor Linux for Signs of Intruders

February 21, 2019

When Sandfly Founder Craig Rowland was brought in to do his first penetration test many years ago, one of the first systems he broke into was a Unix system that had an uptime of four …

READ MOREWhy You Must Monitor Linux for Signs of Intruders

Categories videos Tags videos

Hunting for Linux Intrusion Tactics is Better than Searching for Exploit Signatures

February 14, 2019

When the NSA and CIA source code leaked a couple years back, Sandfly founder Craig Rowland ignored the zero day attacks they had and studied their tactics in the code instead. In this video he’ll …

READ MOREHunting for Linux Intrusion Tactics is Better than Searching for Exploit Signatures

Categories linux forensics, videos Tags intrusion detection, linux forensics, videos

Ninjas on Rooftops – A Better Approach to Linux Threat Hunting

February 12, 2019

Intrusion detection thought for the day: Someone trying to hide is a signature. In this video, Sandfly founder Craig Rowland discusses why hunting for hiding tactics vs. specific exploit signatures is an effective way to …

READ MORENinjas on Rooftops – A Better Approach to Linux Threat Hunting

Categories videos Tags linux forensics, videos

Why You Should Be Searching for Linux Anti-Forensics

February 10, 2019

In this video Sandfly founder Craig Rowland discusses the importance of searching for Linux anti-forensic techniques on hosts you are protecting. Anti-forensics are techniques many intruders and malware use on Linux hosts to conceal their …

READ MOREWhy You Should Be Searching for Linux Anti-Forensics

Categories linux forensics, videos Tags videos

1000 to 1 Rule of Intrusion Detection

February 8, 2019

This is the first in an ongoing series of short videos on topics around intrusion detection, Linux security, digital forensics, malware and anything else Sandfly Founder Craig Rowland finds interesting. Be sure to subscribe to …

READ MORE1000 to 1 Rule of Intrusion Detection

Categories videos Tags linux forensics, videos
Post navigation
Older posts
Page1 Page2 Next →

Categories

  • computer forensics
  • linux forensics
  • presentation
  • sandfly
  • security
  • videos

Tags

agentless security API binary poisoning computer forensics file entropy forensics incident response interview intrusion detection linux linux forensics linux malware malware masquerading news persistence philosophy presentation presentations release rootkits sandfly sandfly-filescan sandfly update security splunk update videos vodafone

Archives

  • January 2021
  • November 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • March 2019
  • February 2019
  • January 2019
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018

Contact Us

  • +64 03 3792313‬
  • 4 Ash Street Christchurch, New Zealand 8011

Connect With Us


Sandfly Security Twitter

Product Navigation

  • Why Sandfly
  • How Sandfly Works
  • Operation
  • Threats Detected
  • FAQ

General Navigation

  • Pricing
  • Videos
  • Blog
  • Testimonials
  • About Us
  • Partners
  • Contact Us
  • Sign Up
  • Under Attack?

Subscribe for special announcements and product update news

© 2021 Sandfly Security | Website Design by Stimulus Creative
This site uses cookies for analytics and performance monitoring. OKPrivacy Policy