In this video, BB King discusses the essentials of setting up and using Burp Suite for web application penetration testing. He covers initial setup, including configuring browsers and managing certificates, and explores various features such as the intercept function, repeater, intruder, and the extender with its wealth of extensions.
In this video, Serena discusses the basics of subnetting in networking, aiming to demystify the topic for beginners and encourage further exploration. They explain the concept of subnet masks, CIDR notation, and how these elements are used to define network and host addresses within a network.
In this video, Serena discusses the fundamentals of networking for beginners, emphasizing the importance of understanding network infrastructure for security professionals. She introduces key concepts such as the OSI model, IP addressing, and the use of tools for reconnaissance, such as DNS and ARP.
In this video, the speakers discuss hardware hacking, focusing on techniques for identifying and exploiting vulnerabilities in various devices such as routers and access points. They demonstrate practical methods using tools like the Jtagulator and bus pirate to interface with device firmware, illustrating the potential to extract sensitive information or manipulate device functionalities.
In this video, Beau Bullock from Black Hills Information Security discusses penetration testing in Azure cloud environments. He provides insights into the methodology of attacking cloud environments, focusing on Azure but also touching on AWS and GCP.
In this video, BB King discusses advanced techniques for leveraging Python in open-source intelligence (OSINT) gathering. He demonstrates how to extract and analyze data, providing insights into handling and parsing responses from various APIs and web services.
In this video, Kent and Jordan discuss effective practices for securing Active Directory and preventing common penetration testing exploits. They explore techniques like establishing strong password policies, disabling outdated protocols, and implementing system monitoring to enhance security.
/// 🔗 Register for webcasts, summits, and workshops – https://poweredbybhis.com 🛝 Webcast Slides – https://www.antisyphontraining.com/wp-content/uploads/2024/05/2024_05_08_anticast_60min-Crash-Course-into-Infosec_Bill-McCauley.pdf 60min Crash Course into Infosec w/ Bill McCauley Join us for a one-hour Antisyphon Anti-cast with instructor Bill McCauley from Secure Ideas, as he dives into a high-level webapp pentest …
/// 🔗 Register for future webcasts, summits, and workshops – https://blackhillsinfosec.zoom.us/ze/hub/stadium 🔗 🛝 Webcast Slides – https://www.antisyphontraining.com/wp-content/uploads/2024/04/2024_04_10_anticast_Secure-Ideas-Foundational-Application-Security-Training_Bill-McCauley.pdf Join us for a free one-hour Antisyphon Anti-cast with Bill McCauley, as he dives into the realm of application security from Secure Ideas’ foundational training class. He’ll also …
/// 🔗 Register for future webcasts, summits, and workshops here – https://blackhillsinfosec.zoom.us/ze/hub/stadium In Cloud We Trust: Common M365 Attack Techniques to Bypass Defenses Ready to learn common attacks to bypass defenses in Microsoft 365? This session will explore techniques used by red teamers to achieve …