Red Team Summit CFP now open! Register Here
Shopping Cart

No products in the cart.

Getting Started with Burp Suite & Webapp Pentesting

In this video, BB King discusses the essentials of setting up and using Burp Suite for web application penetration testing. He covers initial setup, including configuring browsers and managing certificates, and explores various features such as the intercept function, repeater, intruder, and the extender with its wealth of extensions.

Networking for Pentesters: Beginner – Part 2

In this video, Serena discusses the basics of subnetting in networking, aiming to demystify the topic for beginners and encourage further exploration. They explain the concept of subnet masks, CIDR notation, and how these elements are used to define network and host addresses within a network.

SDR Quick Start Guide

In this video, Paul Clark discusses the fundamentals and applications of Software Defined Radio (SDR). He covers key topics including what SDR is, why it matters, and the different types of hardware and software that can enhance SDR experiences.

Networking for Pentesters: Beginner – Part 1

In this video, Serena discusses the fundamentals of networking for beginners, emphasizing the importance of understanding network infrastructure for security professionals. She introduces key concepts such as the OSI model, IP addressing, and the use of tools for reconnaissance, such as DNS and ARP.

Genymotion: Proxying App Traffic Through Burp Suite

In this video, Cameron from Black Hills Information Security discusses how to proxy traffic through Burp from the Android emulator Genymotion. She demonstrates the setup process from creating a virtual device to intercepting application traffic using advanced network configuration and proxy settings.

How (We) Run a Virtual Conference

In this video, Velda, John, Jason, and Deb discuss the challenges and insights of transitioning a physical conference to a virtual format due to unforeseen circumstances. They cover the technical setup, including the use of platforms like GoToWebinar and Discord, and the logistical adjustments needed to accommodate speakers and attendees remotely.

Implementing Sysmon and AppLocker

In this video, the speakers discuss the implementation and benefits of using AppLocker and Sysmon for enhancing security in IT environments. They demonstrate how to set up and configure both tools, and explain how they can prevent unauthorized applications from running and provide detailed logging of system activity.

Network Threat Hunting & AI Hunter Demo

In this video, the speakers discuss various free tools and techniques for hunt teaming within organizations, focusing primarily on network-based approaches. They delve into the challenges of detecting command and control channels, especially when data is encrypted or obfuscated, and explore the use of artificial intelligence to enhance detection capabilities.

How to Hunt for Jobs like a Hacker w/ Jason Blanchard

In this video, Jason and John discuss the intricacies and challenges of job hunting in the cybersecurity field, especially during the COVID-19 pandemic. The presentation offers practical advice on improving job search strategies, enhancing resumes, and effectively using LinkedIn to connect with potential employers.