Red Team Summit CFP now open! Register Here
Shopping Cart

No products in the cart.

How to Fail at a Pentest

In this video, John discusses best practices and lessons learned from his extensive experience in penetration testing. He delves into the common pitfalls and mistakes in the cybersecurity industry, offering insights on how to avoid them.

Coercions and Relays: The First Cred is the Deepest

In this video, Gabriel Prud’homme discusses various techniques for NTLM relay attacks and their mitigation, focusing on the theory, demonstrations, and practical applications. He explains the vulnerabilities in network protocols and systems like LLMNR, SMB, and HTTP, and shows how these can be exploited using tools like Responder and NTLMRelayX.

Securing AWS Discover Cloud Vulnerabilities

In this video, Beau discusses securing AWS, focusing on lateral movement in the cloud. He explains initial access and post-compromise techniques, demonstrating AWS CLI usage for enumerating resources and escalating privileges.

Your Active DAD (Active Domain Active Defense) Primer

In this video, the speaker discusses the concept of cyber deception and its practical applications in domains. They delve into the effectiveness of commercial cyber deception tools and share insights on creating a deceptive environment with fake user IDs and system names.

No SPAN Port? No Tap? No Problem!

In this video, John Strand discusses the innovative techniques for home network defense by leveraging ARP cache poisoning and various security tools. He explains how ARP cache poisoning works and how it can be used to route all traffic through a single device for monitoring and analysis.

How To Use Threat Intelligence

In this video, John discuss the intricacies and challenges of threat intelligence feeds. He delves into the effectiveness of these feeds and how they can often be outdated or misused within security frameworks.

Getting Started with Base64 Encoding and Decoding

In this video, Jon Strand discusses the intricacies of Base64 encoding and decoding. He explains its necessity for transferring binary data over text-based protocols like HTTP and highlights its use in web application security assessments.

Blockchain Security and Smart Contract Auditing

In this video, Beau Bullock discusses the intricacies of blockchain security and smart contract auditing. He explores common vulnerabilities within smart contracts, demonstrates a live hacking example, and provides resources for further learning.

Get an Epic Cyber Education for Free! (Almost!)

This webcast was originally published on June 26, 2024. In this video, Carrie and Zach discuss the Cyber Ninja training plan. They delve into Carrie’s personal journey, effective learning resources, and practical tips for entering the cybersecurity field. The video also covers strategies for obtaining …

A Blue Team’s Perspective on Red Team Hack Tools

In this video, Jordan and Kent discuss the utilization of red team tools from a blue team perspective. They explore how these tools can be repurposed to enhance cybersecurity defenses and the challenges of integrating red team tools into blue team operations.