In this video, David Fletcher discusses the importance of early detection of attackers in your environment by leveraging characteristics of attacks and strategically placing resources in Active Directory. The presentation delves into various tactics including password spraying and the use of tactical deception with planted artifacts to set off tripwires.
In this video, John and Ean discuss techniques and methods used by criminals that can be employed to enhance personal privacy and security. They delve into how these tactics can help individuals protect themselves in a digital age where surveillance and data monitoring are pervasive.
In this video, John Strand discusses the essential Linux commands for initial forensic analysis when suspecting a system compromise. He demonstrates how to use Lsof to identify and investigate open files and network connections, providing insights into process IDs and associated resources.
In this video, Paul Clark discusses the process of reverse engineering using Software Defined Radio (SDR) technology. The presentation covers the essentials of SDR and how it can be utilized in reverse engineering projects, showcasing the steps involved through a practical example.
In this video, John Strand discusses the concept and strategies around Cyber deception. They explore the use of deception technology in cybersecurity, clarifying that it does not involve illegal activities such as hacking back but is aimed at increasing the effort required for an attacker to succeed.
In this video, Carrie Roberts delves into the intricacies of the Atomic Red Team project. He explains how to use the library of scripted cyber attacks to enhance security testing and training, demonstrating practical applications and configurations.
In this video, Ralph discusses how to build a phishing engagement, focusing on coding techniques and tools to automate and secure phishing tests. He demonstrates how infrastructure setup, operational security, and phishing email creation can be automated using tools like Ansible, Terraform, and Docker.
In this video, BB King discusses the security implications and vulnerabilities associated with JSON Web Tokens (JWTs) in web applications. They delve into various attack methods, including the misuse of the ‘none’ algorithm and the potential dangers of poor JWT implementation.
In this video, Hal and John discuss advanced Unix command line techniques and their implications for system administration and security. They delve into various Unix commands, demonstrating their use in real-world scenarios to manipulate and analyze system data effectively.
/// 🔗 Register for webcasts, summits, and workshops – https://blackhillsinfosec.zoom.us/ze/hub/stadium 🛝 Webcast Slides – https://www.antisyphontraining.com/wp-content/uploads/2024/06/2024_06_26_anticast_Get-an-Epic-Cyber-Education-for-Free-almost_Carrie-Roberts.pdf 📈 Carrie’s Spreadsheet – https://onedrive.live.com/view.aspx?resid=5EFC811CDEC9D7F0!19050&authkey=!APDhC5-zBG8bZJI 📰 Related Blog Post – https://www.blackhillsinfosec.com/from-high-school-to-cyber-ninja/ Get an Epic Cyber Education for Free! (Almost!) With Carrie Roberts Carrie Roberts is an Antisyphon instructor and experienced …