Home Labs: Attack and Defend Your DFIR Lab
Markus Schober discusses how to set up and use attack and defend labs for incident response and digital forensics.
Markus Schober discusses how to set up and use attack and defend labs for incident response and digital forensics.
π Register for webcasts, summits, and workshops – https://poweredbybhis.com π Webcast Slides! – https://www.antisyphontraining.com/wp-content/uploads/2024/07/2024_07_31_anticast_Practical-Windows-Forensics-for-Fun-and-Profit_Markus-Schober.pdf Understanding Windows is essential for most cybersecurity roles. However, recognizing the artifacts and traces that indicate a compromised system is a skill that can be both enjoyable and highly valuableβnot just …
/// π Register for webcasts, summits, and workshops – https://blackhillsinfosec.zoom.us/ze/hub/stadium What’s in the Box?? | I.R. Summit 2024 Small businesses often lack basic security controls and are often not aware of what to do. Although we cannot always prevent an attack, we can at least …
/// π Register for webcasts, summits, and workshops – https://blackhillsinfosec.zoom.us/ze/hub/stadium π Webcast slides β https://www.antisyphontraining.com/wp-content/uploads/2024/07/2024_07_17_anticast_Getting-Started-in-Geospatial-Intelligence-GEOINT_Mishaal-Khan.pdf Join us for a free one-hour Antisyphon Anti-cast with instructor Mishaal Khan that will open your eyes and explore the dynamic realm of GEOINT (Geospatial Intelligence), a captivating subset of …
/// π Register for webcasts, summits, and workshops – https://blackhillsinfosec.zoom.us/ze/hub/stadium The Million Dollar CEO Fraud – Anatomy of a Business Email Compromise | I.R. Summit 2024 This talk will detail an incident I responded to at the beginning of my career, where an email compromise …
In this video, the speaker discusses the intricacies of incident response, highlighting the common pitfalls and emphasizing the importance of preparation. They critique the use of flowcharts in incident response, arguing that they are ineffective and often lead to paralysis when deviations occur.
/// π Register for webcasts, summits, and workshops – https://blackhillsinfosec.zoom.us/ze/hub/stadium Expensive forensic tools making you blue? Get back to basics with some wacky Linux shell recipes for parsing forensic artifacts. βddβ, βxxdβ, arithmetic problems, loops and more! You may never want to go back to …
In this video, John discuss the intricacies and challenges of threat intelligence feeds. He delves into the effectiveness of these feeds and how they can often be outdated or misused within security frameworks.
In this video, BB King discusses the security implications and vulnerabilities associated with JSON Web Tokens (JWTs) in web applications. They delve into various attack methods, including the misuse of the ‘none’ algorithm and the potential dangers of poor JWT implementation.
In this video, Hal and John discuss advanced Unix command line techniques and their implications for system administration and security. They delve into various Unix commands, demonstrating their use in real-world scenarios to manipulate and analyze system data effectively.