Did you know Cybrary's video training is FREE? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
In part 2 of the deep dive into CKC7, we look the evidence presented by IOCs. This data can then be instrumental is uncovering adversary activity. Exploits such as keyloggers can provide a big advantage to an intruder by capturing keystrokes in realtime that can reveal passwords. Evidence that one has been installed is a strong IOC. Remote Access Trojans (RAT) and spyware are also evidence of a compromise and can be extremely dangerous. The video concludes with a discussion of social engineering and the various tactics employed from in-person exploits to phishing to phone exploits.