Join us in-person this July for the first-ever Antisyphon Summer Camp! Register Here

Coercions and Relays: The First Cred is the Deepest

In this video, Gabriel Prud’homme discusses various techniques for NTLM relay attacks and their mitigation, focusing on the theory, demonstrations, and practical applications. He explains the vulnerabilities in network protocols and systems like LLMNR, SMB, and HTTP, and shows how these can be exploited using tools like Responder and NTLMRelayX.

No SPAN Port? No Tap? No Problem!

In this video, John Strand discusses the innovative techniques for home network defense by leveraging ARP cache poisoning and various security tools. He explains how ARP cache poisoning works and how it can be used to route all traffic through a single device for monitoring and analysis.

Weaponizing Active Directory

In this video, David Fletcher discusses the importance of early detection of attackers in your environment by leveraging characteristics of attacks and strategically placing resources in Active Directory. The presentation delves into various tactics including password spraying and the use of tactical deception with planted artifacts to set off tripwires.

Getting Started in Cyber Deception

In this video, John Strand discusses the concept and strategies around Cyber deception. They explore the use of deception technology in cybersecurity, clarifying that it does not involve illegal activities such as hacking back but is aimed at increasing the effort required for an attacker to succeed.

Shopping Cart

No products in the cart.