/// 🔗 Register for webcasts, summits, and workshops – https://blackhillsinfosec.zoom.us/ze/hub/stadium Where Do We Begin? – Panel Discussion | I.R. Summit 2024 John Strand, Derek Banks, Troy Wojewoda, Alissa Torres, Gerry Johansen –Where do we start after an incident? –Current trends in Incident Response –Reducing False …
This webcast was originally published on June 26, 2024. In this video, Carrie and Zach discuss the Cyber Ninja training plan. They delve into Carrie’s personal journey, effective learning resources, and practical tips for entering the cybersecurity field. The video also covers strategies for obtaining …
In this video, Jordan and Kent discuss the utilization of red team tools from a blue team perspective. They explore how these tools can be repurposed to enhance cybersecurity defenses and the challenges of integrating red team tools into blue team operations.
In this video, Tim Medin from Red Siege Information Security discusses the fundamentals and intricacies of Kerberos authentication within Windows environments. He explains how Kerberos functions as the main authentication mechanism in Windows Active Directory, detailing its components and the process of ticket granting.
This webcast was originally published on January 31, 2024 In this video, Eric Kuehn delves into advanced techniques for interacting with Active Directory using various tools such as LDP, PowerShell, and AD Cmdlets. He demonstrates how to effectively query and manipulate Active Directory data, providing …
In this video, Greg Hatcher & John Stigerwalt discuss advanced techniques for bypassing antivirus and endpoint detection systems using compiler optimizations and thread pool APIs for process injection.
In this video, Whitney and Eric discuss the powerful capabilities of Velociraptor in threat hunting and incident response. They delve into its ease of deployment, versatile use-cases, and how it significantly enhances cybersecurity measures without high costs.
In this video, Jeff McJunkin discusses the differences and nuances between penetration testing and red teaming, focusing on their respective roles in cybersecurity. He elaborates on the unique approaches and objectives of each, highlighting how they test organizational defenses differently.
In this video, John and Greg discuss the intricacies of setting up and protecting red team infrastructure using Cobalt Strike, AWS, and Azure. They delve into the details of using redirectors, securing C2 servers, and the importance of proper traffic restrictions to avoid detection.
In this video, Paul Clark discusses the intricacies of Python code development for radio applications using the GNU Radio Companion GUI. They explain how to create modular, object-oriented code and the advantages of directly coding radio blocks for better customization and flexibility.