Join us in-person this July for the first-ever Antisyphon Summer Camp! Register Here

Coercions and Relays: The First Cred is the Deepest

In this video, Gabriel Prud’homme discusses various techniques for NTLM relay attacks and their mitigation, focusing on the theory, demonstrations, and practical applications. He explains the vulnerabilities in network protocols and systems like LLMNR, SMB, and HTTP, and shows how these can be exploited using tools like Responder and NTLMRelayX.

Active Directory Hacking: 3 “New” Techniques

This webcast was originally published on January 31, 2024 In this video, Eric Kuehn delves into advanced techniques for interacting with Active Directory using various tools such as LDP, PowerShell, and AD Cmdlets. He demonstrates how to effectively query and manipulate Active Directory data, providing …

AASLR: Red Team Infrastructure Primer

In this video, John and Greg discuss the intricacies of setting up and protecting red team infrastructure using Cobalt Strike, AWS, and Azure. They delve into the details of using redirectors, securing C2 servers, and the importance of proper traffic restrictions to avoid detection.

How to Build a Phishing Engagement: Coding TTP’s

In this video, Ralph discusses how to build a phishing engagement, focusing on coding techniques and tools to automate and secure phishing tests. He demonstrates how infrastructure setup, operational security, and phishing email creation can be automated using tools like Ansible, Terraform, and Docker.

Shopping Cart

No products in the cart.