In this video, Ralph discusses how to build a phishing engagement, focusing on coding techniques and tools to automate and secure phishing tests. He demonstrates how infrastructure setup, operational security, and phishing email creation can be automated using tools like Ansible, Terraform, and Docker.
In this video, BB King discusses the security implications and vulnerabilities associated with JSON Web Tokens (JWTs) in web applications. They delve into various attack methods, including the misuse of the ‘none’ algorithm and the potential dangers of poor JWT implementation.
In this video, Hal and John discuss advanced Unix command line techniques and their implications for system administration and security. They delve into various Unix commands, demonstrating their use in real-world scenarios to manipulate and analyze system data effectively.
/// 🔗 Register for webcasts, summits, and workshops – https://blackhillsinfosec.zoom.us/ze/hub/stadium 🛝 Webcast Slides – https://www.antisyphontraining.com/wp-content/uploads/2024/06/2024_06_26_anticast_Get-an-Epic-Cyber-Education-for-Free-almost_Carrie-Roberts.pdf 📈 Carrie’s Spreadsheet – https://onedrive.live.com/view.aspx?resid=5EFC811CDEC9D7F0!19050&authkey=!APDhC5-zBG8bZJI 📰 Related Blog Post – https://www.blackhillsinfosec.com/from-high-school-to-cyber-ninja/ Get an Epic Cyber Education for Free! (Almost!) With Carrie Roberts Carrie Roberts is an Antisyphon instructor and experienced …
Edited version here: https://youtu.be/ahY49-oIbxw /// 🔗 Register for webcasts, summits, and workshops – https://blackhillsinfosec.zoom.us/ze/hub/stadium Join us for a free one-hour Antisyphon Anti-cast with Carrie as she shares her recommended list of resources as well as other low cost training options. Carrie Roberts is an Antisyphon …
In this video, Michael Allen discusses operational security fundamentals for remote red teams. He delves into the importance of maintaining secrecy in red team operations and the potential risks of exposure.
In this video, BB King discusses the essentials of setting up and using Burp Suite for web application penetration testing. He covers initial setup, including configuring browsers and managing certificates, and explores various features such as the intercept function, repeater, intruder, and the extender with its wealth of extensions.
In this video, Serena discusses the basics of subnetting in networking, aiming to demystify the topic for beginners and encourage further exploration. They explain the concept of subnet masks, CIDR notation, and how these elements are used to define network and host addresses within a network.
In this video, Serena discusses the fundamentals of networking for beginners, emphasizing the importance of understanding network infrastructure for security professionals. She introduces key concepts such as the OSI model, IP addressing, and the use of tools for reconnaissance, such as DNS and ARP.
In this video, Cameron from Black Hills Information Security discusses how to proxy traffic through Burp from the Android emulator Genymotion. She demonstrates the setup process from creating a virtual device to intercepting application traffic using advanced network configuration and proxy settings.