In this video, Gabriel Prud’homme discusses various techniques for NTLM relay attacks and their mitigation, focusing on the theory, demonstrations, and practical applications. He explains the vulnerabilities in network protocols and systems like LLMNR, SMB, and HTTP, and shows how these can be exploited using tools like Responder and NTLMRelayX.
🔗Register for this PWYC Class here – https://www.antisyphontraining.com/event/active-defense-cyber-deception-3/ 🔗 Lab Resources & Instructions -https://www.antisyphontraining.com/john-strand-training-lab-download-instructions/ 🔗 Antisyphontraining.com – https://www.antisyphontraining.com/ 🔗 Antisyphon Discord – https://discord.gg/antisyphon – active-defense-and-cyber-deception-july2024 Active Defenses have garnered significant media attention, with debates on whether to attack attackers or avoid active responses. We believe the …
In this video, John Strand discusses the innovative techniques for home network defense by leveraging ARP cache poisoning and various security tools. He explains how ARP cache poisoning works and how it can be used to route all traffic through a single device for monitoring and analysis.
Dungeons & Dragons – The Security Tool You Didn’t Know You Needed Klaus Agnoletti In my talk, I’ll dive into the world of game-based learning in cybersecurity, showcasing HackBack – a unique framework that blends role-playing game elements with security training. I’ll explain how HackBack …
In this video, John discuss the intricacies and challenges of threat intelligence feeds. He delves into the effectiveness of these feeds and how they can often be outdated or misused within security frameworks.
In this video, Jordan and Kent discuss the utilization of red team tools from a blue team perspective. They explore how these tools can be repurposed to enhance cybersecurity defenses and the challenges of integrating red team tools into blue team operations.
In this video, David Fletcher discusses the importance of early detection of attackers in your environment by leveraging characteristics of attacks and strategically placing resources in Active Directory. The presentation delves into various tactics including password spraying and the use of tactical deception with planted artifacts to set off tripwires.
In this video, John and Ean discuss techniques and methods used by criminals that can be employed to enhance personal privacy and security. They delve into how these tactics can help individuals protect themselves in a digital age where surveillance and data monitoring are pervasive.
In this video, John Strand discusses the essential Linux commands for initial forensic analysis when suspecting a system compromise. He demonstrates how to use Lsof to identify and investigate open files and network connections, providing insights into process IDs and associated resources.
In this video, John Strand discusses the concept and strategies around Cyber deception. They explore the use of deception technology in cybersecurity, clarifying that it does not involve illegal activities such as hacking back but is aimed at increasing the effort required for an attacker to succeed.