In this video, the speaker discusses the intricacies of incident response, highlighting the common pitfalls and emphasizing the importance of preparation. They critique the use of flowcharts in incident response, arguing that they are ineffective and often lead to paralysis when deviations occur.
In this video, Mike from Black Hills Information Security discusses the comprehensive process and various methodologies involved in penetration testing. He breaks down the different types of penetration tests, such as external, internal, and cloud pentests, and explains the phases from reconnaissance to reporting.
In this video, John discusses best practices and lessons learned from his extensive experience in penetration testing. He delves into the common pitfalls and mistakes in the cybersecurity industry, offering insights on how to avoid them.
In this video, Gabriel Prud’homme discusses various techniques for NTLM relay attacks and their mitigation, focusing on the theory, demonstrations, and practical applications. He explains the vulnerabilities in network protocols and systems like LLMNR, SMB, and HTTP, and shows how these can be exploited using tools like Responder and NTLMRelayX.
/// 🔗 Register for webcasts, summits, and workshops – https://blackhillsinfosec.zoom.us/ze/hub/stadium Navigating the Shadows: Incident Response in the Age of Dark Web Tactics In the realm of cybersecurity, organizations face an increasingly complex threat landscape, with adversaries leveraging the dark web for sophisticated attacks. This talk …
🔗Register for this PWYC Class here – https://www.antisyphontraining.com/event/active-defense-cyber-deception-3/ 🔗 Lab Resources & Instructions -https://www.antisyphontraining.com/john-strand-training-lab-download-instructions/ 🔗 Antisyphontraining.com – https://www.antisyphontraining.com/ 🔗 Antisyphon Discord – https://discord.gg/antisyphon – active-defense-and-cyber-deception-july2024 Active Defenses have garnered significant media attention, with debates on whether to attack attackers or avoid active responses. We believe the …
/// 🔗 Register for webcasts, summits, and workshops – https://blackhillsinfosec.zoom.us/ze/hub/stadium Demystifying AWS Incident Response: A Practical Perspective | I.R. Summit 2024 I would be speaking on how do we deal with exposed IAM access / secret keys incident scenerio, where keys were inadvertently pushed by …
In this video, Beau discusses securing AWS, focusing on lateral movement in the cloud. He explains initial access and post-compromise techniques, demonstrating AWS CLI usage for enumerating resources and escalating privileges.
In this video, the speaker discusses the concept of cyber deception and its practical applications in domains. They delve into the effectiveness of commercial cyber deception tools and share insights on creating a deceptive environment with fake user IDs and system names.
In this video, John Strand discusses the innovative techniques for home network defense by leveraging ARP cache poisoning and various security tools. He explains how ARP cache poisoning works and how it can be used to route all traffic through a single device for monitoring and analysis.