Edited version here: https://youtu.be/ahY49-oIbxw /// 🔗 Register for webcasts, summits, and workshops – https://blackhillsinfosec.zoom.us/ze/hub/stadium Join us for a free one-hour Antisyphon Anti-cast with Carrie as she shares her recommended list of resources as well as other low cost training options. Carrie Roberts is an Antisyphon …
In this video, Michael Allen discusses operational security fundamentals for remote red teams. He delves into the importance of maintaining secrecy in red team operations and the potential risks of exposure.
In this video, BB King discusses the essentials of setting up and using Burp Suite for web application penetration testing. He covers initial setup, including configuring browsers and managing certificates, and explores various features such as the intercept function, repeater, intruder, and the extender with its wealth of extensions.
In this video, Serena discusses the basics of subnetting in networking, aiming to demystify the topic for beginners and encourage further exploration. They explain the concept of subnet masks, CIDR notation, and how these elements are used to define network and host addresses within a network.
In this video, Paul Clark discusses the fundamentals and applications of Software Defined Radio (SDR). He covers key topics including what SDR is, why it matters, and the different types of hardware and software that can enhance SDR experiences.
In this video, Serena discusses the fundamentals of networking for beginners, emphasizing the importance of understanding network infrastructure for security professionals. She introduces key concepts such as the OSI model, IP addressing, and the use of tools for reconnaissance, such as DNS and ARP.
In this video, Cameron from Black Hills Information Security discusses how to proxy traffic through Burp from the Android emulator Genymotion. She demonstrates the setup process from creating a virtual device to intercepting application traffic using advanced network configuration and proxy settings.
In this video, Velda, John, Jason, and Deb discuss the challenges and insights of transitioning a physical conference to a virtual format due to unforeseen circumstances. They cover the technical setup, including the use of platforms like GoToWebinar and Discord, and the logistical adjustments needed to accommodate speakers and attendees remotely.
In this video, the speakers discuss the implementation and benefits of using AppLocker and Sysmon for enhancing security in IT environments. They demonstrate how to set up and configure both tools, and explain how they can prevent unauthorized applications from running and provide detailed logging of system activity.
In this video, the speakers discuss various free tools and techniques for hunt teaming within organizations, focusing primarily on network-based approaches. They delve into the challenges of detecting command and control channels, especially when data is encrypted or obfuscated, and explore the use of artificial intelligence to enhance detection capabilities.