Join us in-person this July for the first-ever Antisyphon Summer Camp! Register Here

Genymotion: Proxying App Traffic Through Burp Suite

In this video, Cameron from Black Hills Information Security discusses how to proxy traffic through Burp from the Android emulator Genymotion. She demonstrates the setup process from creating a virtual device to intercepting application traffic using advanced network configuration and proxy settings.

Implementing Sysmon and AppLocker

In this video, the speakers discuss the implementation and benefits of using AppLocker and Sysmon for enhancing security in IT environments. They demonstrate how to set up and configure both tools, and explain how they can prevent unauthorized applications from running and provide detailed logging of system activity.

Network Threat Hunting & AI Hunter Demo

In this video, the speakers discuss various free tools and techniques for hunt teaming within organizations, focusing primarily on network-based approaches. They delve into the challenges of detecting command and control channels, especially when data is encrypted or obfuscated, and explore the use of artificial intelligence to enhance detection capabilities.

Windows Memory Forensics

In this video, John and Alyssa discuss advanced memory analysis techniques. They delve into the use of tools like Volatility and Rekall for dissecting memory dumps, and demonstrate how to extract critical data from a Windows operating system.

Shopping Cart

No products in the cart.