Shopping Cart

No products in the cart.

Introduction to Pentesting

In this video, Mike from Black Hills Information Security discusses the comprehensive process and various methodologies involved in penetration testing. He breaks down the different types of penetration tests, such as external, internal, and cloud pentests, and explains the phases from reconnaissance to reporting.

How to Fail at a Pentest

In this video, John discusses best practices and lessons learned from his extensive experience in penetration testing. He delves into the common pitfalls and mistakes in the cybersecurity industry, offering insights on how to avoid them.

Coercions and Relays: The First Cred is the Deepest

In this video, Gabriel Prud’homme discusses various techniques for NTLM relay attacks and their mitigation, focusing on the theory, demonstrations, and practical applications. He explains the vulnerabilities in network protocols and systems like LLMNR, SMB, and HTTP, and shows how these can be exploited using tools like Responder and NTLMRelayX.

No SPAN Port? No Tap? No Problem!

In this video, John Strand discusses the innovative techniques for home network defense by leveraging ARP cache poisoning and various security tools. He explains how ARP cache poisoning works and how it can be used to route all traffic through a single device for monitoring and analysis.