🔗 Register for webcasts, summits, and workshops – https://poweredbybhis.com ✏️🔗 Ransomware Attack Simulation and Investigation for Blue Teamers with Markus Schober – https://www.antisyphontraining.com/course/ransomware-attack-simulation-and-investigation-for-blue-teamers-with-markus-schober/ 🛝 Webcast Slides – https://www.antisyphontraining.com/wp-content/uploads/2024/09/Schober_Sept11_slides.pdf Engaging in a DFIR lab can both highly valuable and enjoyable. What does it take to create …
🔗 Register for webcasts, summits, and workshops – https://poweredbybhis.com Engaging in a DFIR lab can both highly valuable and enjoyable. What does it take to create a DFIR lab that provides meaningful and realistic training? Join us for a free one-hour Antisyphon Anti-cast with instructor, …
/// 🔗 Register for webcasts, summits, and workshops – https://poweredbybhis.com 🛝 Webcast Slides – https://www.antisyphontraining.com/wp-content/uploads/2024/08/2024_08_21_anticast_W.T.F.-Is-a-Kubernete-and-How-Do-I-Attack-It_Graham-Helton.pdf We’ve all heard of Kubernetes, but for most of us it’s a topic we’ve ignored by saying “I’ll figure out what it is one day”. Unfortunately for our free time, …
🔗 Register for webcasts, summits, and workshops – https://poweredbybhis.com 🛝 Webcast Slides – https://www.antisyphontraining.com/wp-content/uploads/2024/08/2024_08_14_anticast_Offense-for-Defense-w-Jason-Downey.pdf Offense for Defense w/ Jason Downey from Red Siege Information Security Penetration testing isn’t a dark art; it’s a set of actionable, practical techniques that defenders can integrate into their playbooks …
🔗 Register for webcasts, summits, and workshops – https://poweredbybhis.com 🛝 Webcast Slides! – https://www.antisyphontraining.com/wp-content/uploads/2024/08/2024_08_07_anticast_New-Methods-to-Attack-Defend-Active-Directory_Eric-Kuehn.pdf New Methods to Attack & Defend Active Directory w/ Eric Kuehn With the recent enhancements Microsoft has made to Active Directory security, staying hidden during a penetration test has gotten harder. …
In this video, Gabriel Prud’homme discusses various techniques for NTLM relay attacks and their mitigation, focusing on the theory, demonstrations, and practical applications. He explains the vulnerabilities in network protocols and systems like LLMNR, SMB, and HTTP, and shows how these can be exploited using tools like Responder and NTLMRelayX.
Dungeons & Dragons – The Security Tool You Didn’t Know You Needed Klaus Agnoletti In my talk, I’ll dive into the world of game-based learning in cybersecurity, showcasing HackBack – a unique framework that blends role-playing game elements with security training. I’ll explain how HackBack …
In this video, Jordan and Kent discuss the utilization of red team tools from a blue team perspective. They explore how these tools can be repurposed to enhance cybersecurity defenses and the challenges of integrating red team tools into blue team operations.
This webcast was originally published on January 31, 2024 In this video, Eric Kuehn delves into advanced techniques for interacting with Active Directory using various tools such as LDP, PowerShell, and AD Cmdlets. He demonstrates how to effectively query and manipulate Active Directory data, providing …
In this video, Greg Hatcher & John Stigerwalt discuss advanced techniques for bypassing antivirus and endpoint detection systems using compiler optimizations and thread pool APIs for process injection.