In this video, the speaker discusses the intricacies and benefits of setting up and using home labs for network security and testing. They delve into the hardware and software components necessary for building a functional home lab, emphasizing the importance of customization to meet specific learning and testing needs.
🔗 Lab Resources https://github.com/strandjs/IntroLabs/blob/master/IntroClassFiles/navigation.md 🔗 VM Download Instructions https://www.antisyphontraining.com/john-strand-training-lab-download-instructions/ 🔗 Pay What You Can (PWYC) Training Schedule https://www.antisyphontraining.com/pay-what-you-can/ This 16-hour (4-days, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots …
In this video, John and Rob discuss various network monitoring and security tools, highlighting their functionalities and applications in cybersecurity. They demonstrate the use of tools like Rita and LogRhythm’s Network Monitor, explaining how these tools can be used for traffic analysis, threat detection, and incident response.
In this video, John Strand discusses the concept of beaconing using the tool Rita from the Active Defense Harbinger Distribution (ADHD). He explains how to use Rita to analyze packet captures for beaconing patterns, leveraging its capabilities to parse and analyze network data.
/// 🔗 Register for webcasts, summits, and workshops – https://blackhillsinfosec.zoom.us/ze/hub/stadium 🛝 Webcast Slides – https://www.antisyphontraining.com/wp-content/uploads/2024/06/2024_06_05_anticast_How-to-Forge-Fake-News-and-Spawn-Flawless-Phisheries_Michael-Allen.pdf Anyone (and we mean anyone) can create perfect forgeries of trusted websites and use them to spread misinformation, conduct phishing attacks, or worse. In this webcast we explore the topic …
/// 🔗 Register for webcasts, summits, and workshops – https://blackhillsinfosec.zoom.us/ze/hub/stadium 🛝 Webcast Slides – https://www.antisyphontraining.com/wp-content/uploads/2024/05/2024_05_29_anticast_Realistic-End-to-End-Attacks-Detective-Controls_Jeff-McJunkin.pdf Jeff reveals the five ways outside attackers gain internal access and outlines three core defender objectives: Reducing initial access.Lowering detection and response time.Slowing down the attackers. Discover actionable insights through …
/// 🔗 Register for webcasts, summits, and workshops – https://blackhillsinfosec.zoom.us/ze/hub/stadium 🛝 Webcast Slides – https://www.antisyphontraining.com/wp-content/uploads/2024/05/2024_05_22_anticast_Offensive-Wireless-for-Red-Teams_Alex-Sanders.pdf In this expanded rendition of the Alex’s Offensive Summit talk ‘Wireless for Red Teams,’ he will broaden your understanding of wireless technologies and how to leverage them in red team …
/// 🔗 Register for webcasts, summits, and workshops – https://blackhillsinfosec.zoom.us/ze/hub/stadium 🛝 Webcast Slides – https://www.antisyphontraining.com/wp-content/uploads/2024/05/2024_05_15_anticast_Threat-Models-Landscape-and-Profiles-OH-MY_Wade-Wells.pdf This free one-hour Antisyphon Anti-cast with instructor Wade Wells offers an insightful overview of cyber threat landscaping, threat modeling, and threat profiling. Wade aims to equip attendees with the knowledge …
/// 🔗 Register for webcasts, summits, and workshops – https://poweredbybhis.com 🛝 Webcast Slides – https://www.antisyphontraining.com/wp-content/uploads/2024/05/2024_05_08_anticast_60min-Crash-Course-into-Infosec_Bill-McCauley.pdf 60min Crash Course into Infosec w/ Bill McCauley Join us for a one-hour Antisyphon Anti-cast with instructor Bill McCauley from Secure Ideas, as he dives into a high-level webapp pentest …