Many aspiring cybersecurity professionals dream of becoming a member of a Red Team one day, but it can be difficult to know exactly what skills, tools, and tactics to focus on to help make that dream a reality. If only there was a resource available …
This Anti-Cast was originally aired on January 15, 2025. In this video, Tim Medin discusses the challenges and best practices of offensive and defensive security, emphasizing the importance of collaboration between red and blue teams. He covers a range of topics including password management, the …
🔗 Register for webcasts, summits, and workshops – https://poweredbybhis.com Over the last year and a half, Michael Allen, of Black Hills Information Security, has run the same social engineering attack over and over against all sorts of well-defended organizations: Adversary-in-the-Middle phishing through the U.S. mail. …
🔗 Register for webcasts, summits, and workshops – https://poweredbybhis.com ✏️🔗 Ransomware Attack Simulation and Investigation for Blue Teamers with Markus Schober – https://www.antisyphontraining.com/course/ransomware-attack-simulation-and-investigation-for-blue-teamers-with-markus-schober/ 🛝 Webcast Slides – https://www.antisyphontraining.com/wp-content/uploads/2024/09/Schober_Sept11_slides.pdf Engaging in a DFIR lab can both highly valuable and enjoyable. What does it take to create …
🔗 Register for webcasts, summits, and workshops – https://poweredbybhis.com Engaging in a DFIR lab can both highly valuable and enjoyable. What does it take to create a DFIR lab that provides meaningful and realistic training? Join us for a free one-hour Antisyphon Anti-cast with instructor, …
/// 🔗 Register for webcasts, summits, and workshops – https://poweredbybhis.com 🛝 Webcast Slides – https://www.antisyphontraining.com/wp-content/uploads/2024/08/2024_08_21_anticast_W.T.F.-Is-a-Kubernete-and-How-Do-I-Attack-It_Graham-Helton.pdf We’ve all heard of Kubernetes, but for most of us it’s a topic we’ve ignored by saying “I’ll figure out what it is one day”. Unfortunately for our free time, …
🔗 Register for webcasts, summits, and workshops – https://poweredbybhis.com 🛝 Webcast Slides – https://www.antisyphontraining.com/wp-content/uploads/2024/08/2024_08_14_anticast_Offense-for-Defense-w-Jason-Downey.pdf Offense for Defense w/ Jason Downey from Red Siege Information Security Penetration testing isn’t a dark art; it’s a set of actionable, practical techniques that defenders can integrate into their playbooks …
🔗 Register for webcasts, summits, and workshops – https://poweredbybhis.com 🛝 Webcast Slides! – https://www.antisyphontraining.com/wp-content/uploads/2024/08/2024_08_07_anticast_New-Methods-to-Attack-Defend-Active-Directory_Eric-Kuehn.pdf New Methods to Attack & Defend Active Directory w/ Eric Kuehn With the recent enhancements Microsoft has made to Active Directory security, staying hidden during a penetration test has gotten harder. …
In this video, Gabriel Prud’homme discusses various techniques for NTLM relay attacks and their mitigation, focusing on the theory, demonstrations, and practical applications. He explains the vulnerabilities in network protocols and systems like LLMNR, SMB, and HTTP, and shows how these can be exploited using tools like Responder and NTLMRelayX.
Dungeons & Dragons – The Security Tool You Didn’t Know You Needed Klaus Agnoletti In my talk, I’ll dive into the world of game-based learning in cybersecurity, showcasing HackBack – a unique framework that blends role-playing game elements with security training. I’ll explain how HackBack …