Join us in-person this July for the first-ever Antisyphon Summer Camp! Register Here

We Can Hardware Hack! And You Can Too!

In this video, the speakers discuss hardware hacking, focusing on techniques for identifying and exploiting vulnerabilities in various devices such as routers and access points. They demonstrate practical methods using tools like the Jtagulator and bus pirate to interface with device firmware, illustrating the potential to extract sensitive information or manipulate device functionalities.

Getting Started With Wireshark

In this video, John Strand discusses the practical applications and features of Wireshark for network analysis. He demonstrates how to use Wireshark to capture and analyze packets, emphasizing its advantages over tcpdump.

Getting Started in Pentesting The Cloud–Azure

In this video, Beau Bullock from Black Hills Information Security discusses penetration testing in Azure cloud environments. He provides insights into the methodology of attacking cloud environments, focusing on Azure but also touching on AWS and GCP.

A Young SOC Analyst’s Illustrated Primer

In this video, the speakers discuss the complex and dynamic topic of cybersecurity. They explore various security challenges and the latest strategies for protecting digital assets.

AD Best Practices That Frustrate Pentesters

In this video, Kent and Jordan discuss effective practices for securing Active Directory and preventing common penetration testing exploits. They explore techniques like establishing strong password policies, disabling outdated protocols, and implementing system monitoring to enhance security.

Windows logging, Sysmon, and ELK

In this video, the speakers discuss the powerful capabilities of the ELK stack (Elasticsearch, Logstash, and Kibana) for handling and analyzing Sysmon logs to improve cybersecurity measures.

Your 5 Year Path: Success in InfoSec

In this video, the speaker discusses their journey and insights into the field of computer security, emphasizing the importance of foundational knowledge and hands-on experience. They detail their career progression, from initial roles in technical support to specialized positions in security, highlighting key learning moments and decisions.

Your Free and Open Source EDR Options!

In this video, the speakers discuss the effectiveness and accessibility of free and open-source Endpoint Detection and Response (EDR) tools. They explore the recent developments in the space, highlighting how these tools are now more accessible to smaller organizations due to their cost-effectiveness.

How to Build a Home Lab (with Bill Stearns)

In this video, John and Bill discuss setting up and utilizing a home lab for security testing and experimentation. They cover the importance of a controlled environment for safely running malicious software and testing security tools, illustrating how to configure network isolation and capturing traffic for analysis.

Shopping Cart

No products in the cart.