In this video, the speaker discusses the concept of cyber deception and its practical applications in domains. They delve into the effectiveness of commercial cyber deception tools and share insights on creating a deceptive environment with fake user IDs and system names.
In this video, John Strand discusses the innovative techniques for home network defense by leveraging ARP cache poisoning and various security tools. He explains how ARP cache poisoning works and how it can be used to route all traffic through a single device for monitoring and analysis.
/// 🔗 Register for webcasts, summits, and workshops – https://blackhillsinfosec.zoom.us/ze/hub/stadium Expensive forensic tools making you blue? Get back to basics with some wacky Linux shell recipes for parsing forensic artifacts. “dd”, “xxd”, arithmetic problems, loops and more! You may never want to go back to …
Dungeons & Dragons – The Security Tool You Didn’t Know You Needed Klaus Agnoletti In my talk, I’ll dive into the world of game-based learning in cybersecurity, showcasing HackBack – a unique framework that blends role-playing game elements with security training. I’ll explain how HackBack …
/// 🔗 Register for webcasts, summits, and workshops – https://blackhillsinfosec.zoom.us/ze/hub/stadium Incident Response as a Recovering Pentester – Alter Basaran Hi, my name is Alper and I’m a Penetration Tester and your Incident Responder.” Over the past year our company has sent me to more incident …
/// 🔗 Register for webcasts, summits, and workshops – https://blackhillsinfosec.zoom.us/ze/hub/stadium 🛝 Webcast Slides – https://www.antisyphontraining.com/wp-content/uploads/2024/07/2024_07_10_anticast_Cyber-Security-Incident-Management_Gerard-Johansen.pdf Join us for a free one-hour Antisyphon Anti-cast with instructor Gerard Johansen on Cyber Security Incident Management. He’ll show you the operational and strategic decision making that takes place during …
In this video, John discuss the intricacies and challenges of threat intelligence feeds. He delves into the effectiveness of these feeds and how they can often be outdated or misused within security frameworks.
In this video, Jon Strand discusses the intricacies of Base64 encoding and decoding. He explains its necessity for transferring binary data over text-based protocols like HTTP and highlights its use in web application security assessments.
In this video, Beau Bullock discusses the intricacies of blockchain security and smart contract auditing. He explores common vulnerabilities within smart contracts, demonstrates a live hacking example, and provides resources for further learning.
/// 🔗 Register for webcasts, summits, and workshops – https://blackhillsinfosec.zoom.us/ze/hub/stadium How I started my summer vacation: Navigating My First Incident in the Cloud – Josh Hankins In this presentation, I’ll share my firsthand experience managing an event entirely based in the cloud. Buckle up for “The …