BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Antisyphon Training - ECPv6.15.17.1//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Antisyphon Training
X-ORIGINAL-URL:https://www.antisyphontraining.com
X-WR-CALDESC:Events for Antisyphon Training
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20220313T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20221106T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240214T120000
DTEND;TZID=America/New_York:20240214T130000
DTSTAMP:20260403T125149
CREATED:20240904T175738Z
LAST-MODIFIED:20240904T175822Z
UID:10000618-1707912000-1707915600@www.antisyphontraining.com
SUMMARY:Anti-Cast: For the Love of the Windows Search Index with Alissa Torres
DESCRIPTION:The Windows Search Indexer service does not just provide a fast way to locate and access a misplaced file\, this service’s database holds tremendous forensic value for host investigations. \n\n\n\nWith the recent introduction of efficient parsing tools\, analysts can gain access to these gems from the Indexer database: directory/file metadata\, content file summaries and user browser/activity logs. \n\n\n\nJoin Alissa Torres in this free one-hour Antisyphon Anti-Cast to learn how the Windows Search Index can augment your investigations. Fall in love with this under-rated artifact. \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\n2024_02_14_anticast_For the Love of the Windows Search Index_Alissa TorresDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-for-the-love-of-the-windows-search-index-with-alissa-torres/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/For-the-Love-of-the-Windows-Search-Index_Alissa-Torres.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240207T120000
DTEND;TZID=America/New_York:20240207T130000
DTSTAMP:20260403T125149
CREATED:20240905T195930Z
LAST-MODIFIED:20240905T195931Z
UID:10000619-1707307200-1707310800@www.antisyphontraining.com
SUMMARY:Anti-Cast: All About Systemd Timers with Hal Pomeranz
DESCRIPTION:The Linux-guru\, Hal Pomeranz\, returns for a free one-hour Antisypon Anti-cast! \n\n\n\nAs if Linux didn’t already have enough task scheduling mechanisms\, we now have “timers”—a highly configurable task scheduling mechanism implemented by Systemd. Threat actors are already starting to use Systemd timers for persistence. \n\n\n\nHal will cover the basics of configuring Systemd timers and how they operate\, plus forensic indicators you can look for to find any timers deployed in your systems. \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\n2024_02_07_anticast_All About Systemd Timers_Hal PomeranzDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-all-about-systemd-timers-with-hal-pomeranz/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/All-About-Systemd-Timers_Hal-Pomeranz.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240131T120000
DTEND;TZID=America/New_York:20240131T130000
DTSTAMP:20260403T125149
CREATED:20240905T200738Z
LAST-MODIFIED:20240905T200739Z
UID:10000620-1706702400-1706706000@www.antisyphontraining.com
SUMMARY:Anti-Cast: Active Directory Hacking-3 'New' Techniques with Eric Kuehn
DESCRIPTION:If you want to master the art of penetration testing\, you need to know how to exploit Active Directory (AD). \n\n\n\nIt’s the backbone of most networks and it holds the keys to the kingdom. But cracking it is not always easy. \n\n\n\nYou need to use the right tools and techniques for the job. \n\n\n\nIn this free one-hour Antisyphon Anti-Cast\, you’ll learn 3 different ways that can help you extract valuable information from AD\, modify its settings and gain full control over the network. \n\n\n\nThis Anti-Cast comes with practical demos and tips that will boost your hacking skills. \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\n2024_01_31_anticast_Active Directory Hacking-3 ‘New’ Techniques_Eric KuehnDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-active-directory-hacking-3-new-techniques-with-eric-kuehn/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Active-Directory-Hacking-3-New-Techniques-w_Eric-Kuehn.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240124T120000
DTEND;TZID=America/New_York:20240124T130000
DTSTAMP:20260403T125149
CREATED:20240905T205614Z
LAST-MODIFIED:20240905T210403Z
UID:10000621-1706097600-1706101200@www.antisyphontraining.com
SUMMARY:Anti-Cast: Cloud Identity Management for Everyone with Andrew Krug
DESCRIPTION:In every cloud\, Identity and Access Management are incredibly challenging for the most skilled practitioners. \n\n\n\nIn this free one-hour Antisyphon Anti-Cast we’ll review different cloud provider identity and access paradigms\, look at the systems for granting access\, and where the pitfalls are. \n\n\n\nWe’ll review the various grammars as well and demystify IAM for any user of any cloud. \n\n\n\nAttendees will leave with a firm understanding of how to go beyond the defaults. \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com
URL:https://www.antisyphontraining.com/event/anti-cast-cloud-identity-management-for-everyone-with-andrew-krug/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Cloud-Identity-Management-for-Everyone_Andrew-Krug.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240117T120000
DTEND;TZID=America/New_York:20240117T130000
DTSTAMP:20260403T125149
CREATED:20240905T212000Z
LAST-MODIFIED:20240905T212002Z
UID:10000622-1705492800-1705496400@www.antisyphontraining.com
SUMMARY:Anti-Cast: WMI Abuse: How Threat Actors Use WMI with Gerard Johansen
DESCRIPTION:In this free one-hour Antisyphon Anti-Cast\, Gerard Johansen\, Principal Readiness Engineer for Red Canary and Antisyphon instructor\, will run through how threat actors use the Windows Management Instrumentation (WMI) for Lateral Movement and Persistence. \n\n\n\nGerard will walk through how threat actors use WMI\, what trace evidence is left and how to analyze WMI abuse. \n\n\n\nFinally\, Gerard will walk through some demonstrations using Atomic Red Team and forensic tools. \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\n2024_01_17_anticast_WMI Abuse-How Threat Actors Use WMI_Gerard JohansenDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-wmi-abuse-how-threat-actors-use-wmi-with-gerard-johansen/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/WMI-Abuse_How-Threat-Actors-Use-WMI_Gerard-Johansen.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240110T120000
DTEND;TZID=America/New_York:20240110T130000
DTSTAMP:20260403T125149
CREATED:20240905T213657Z
LAST-MODIFIED:20240905T213658Z
UID:10000623-1704888000-1704891600@www.antisyphontraining.com
SUMMARY:Anti-Cast: New Year\, New Skills: Web App Pentesting with Jennifer Shannon
DESCRIPTION:In a world where web applications are the new battleground. \n\n\n\nHackers are constantly looking for ways to exploit them and steal your secrets\, sabotage your network\, or harm your customers. \n\n\n\nBut you are not alone… \n\n\n\nJennifer Shannon is here to help you fight back. \n\n\n\nIn this free one-hour Antisyphon Anti-cast\, Jennifer will teach you how to test your web applications and find the vulnerabilities before they do. \n\n\n\nShe will show you the tools\, the techniques\, and the tricks of the trade. \n\n\n\nThis is not just a Anti-cast… This is a mission. \n\n\n\nAre you ready to join? \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\n2024_01_10_anticast_New Year\, New Skills_Web App Pentesting_Jennifer ShannonDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-new-year-new-skills-web-app-pentesting-with-jennifer-shannon/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/New-Year-New-Skills_Web-App-Pentesting_Jennifer-Shannon.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20231220T120000
DTEND;TZID=America/New_York:20231220T130000
DTSTAMP:20260403T125149
CREATED:20240910T155521Z
LAST-MODIFIED:20240910T155522Z
UID:10000624-1703073600-1703077200@www.antisyphontraining.com
SUMMARY:Anti-Cast: Sharpening Your Skills - Web PenTesting with SamuraiWTF with Kevin Johnson
DESCRIPTION:Join us for an in-depth exploration in ‘Sharpening Your Skills: Web PenTesting with SamuraiWTF\,’ where we dive into the techniques and tools for web application security. \n\n\n\nThis talk is specially designed for those eager to elevate their web penetration testing skills using the OWASP Samurai Web Training Framework (SamuraiWTF). We will not just discuss but actively demonstrate the tools and targets within SamuraiWTF. The session is structured to provide a practical\, demo-heavy approach\, allowing attendees to see the tools and techniques in action. \n\n\n\nWhether you’re looking to refine your existing skills or explore new strategies in web security\, this session promises to be an engaging and deeply informative journey into the world of web penetration testing. \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com
URL:https://www.antisyphontraining.com/event/anti-cast-sharpening-your-skills-web-pentesting-with-samuraiwtf-with-kevin-johnson/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Sharpening-Your-Skills_Web-PenTesting-with-SamuraiWTF_Kevin-Johnson.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20231213T120000
DTEND;TZID=America/New_York:20231213T130000
DTSTAMP:20260403T125149
CREATED:20240910T155935Z
LAST-MODIFIED:20240910T155936Z
UID:10000625-1702468800-1702472400@www.antisyphontraining.com
SUMMARY:Anti-Cast: Triad of Success - Education\, Experience\, and Networking with Wade Wells
DESCRIPTION:In the ever-evolving landscape of professional development\, the triad of education\, experience\, and networking emerges as a foundational pillar for career growth and success. \n\n\n\nThis free one-hour Antisyphon Anti-Cast delves into the intricate interplay of these three crucial elements\, exploring how they individually and collectively influence career trajectories. \n\n\n\nWade aims to equip the audience with a comprehensive understanding of how education\, experience\, and networking function as key drivers in shaping a successful career. \n\n\n\nAttendees will leave with actionable insights and strategies to apply these principles in their own professional journeys. \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nTriad of Success – Education Experience and Networking with Wade WellsDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-triad-of-success-education-experience-and-networking-with-wade-wells/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Triad-of-Success_Education-Experience-and-Networking_Wade-Wells.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20231129T120000
DTEND;TZID=America/New_York:20231129T130000
DTSTAMP:20260403T125149
CREATED:20240910T160500Z
LAST-MODIFIED:20240910T160501Z
UID:10000626-1701259200-1701262800@www.antisyphontraining.com
SUMMARY:Anti-Cast: Oil\, Circuits\, & Cheese - An Additive Model of Failure with Jennifer Shannon
DESCRIPTION:The Swiss cheese model\, developed in 1990 by James Reason\, is based on the idea that errors can never be eliminated entirely due to complex systems but are instead “layered” like slices of swiss cheese. This model has become a well-known concept in the field of risk management that highlights how multiple layers of defense can fail\, leading to a catastrophic outcome. This model aims to provide information to decision-makers to help them reduce the chances of incidents occurring. It is crucial to keep in mind that all safety measures within an organization are linked\, and by implementing appropriate policies and standards\, risk can be minimized. So how can we apply this model to cybersecurity\, where multiple layers of security can be breached during a compromise? This talk will explore how the Swiss cheese model can be used to understand the vulnerabilities and cybersecurity risks posed to organizations. We will also examine how the layers of defense\, including people\, processes\, and technology\, can fail and lead to a breach. \n\n\n\nJennifer is a senior security consultant at Secure Ideas with a background in malware analysis\, penetration testing\, and teaching. An avid computer geek for most of her life\, she began her journey in cybersecurity as a SOC Analyst\, where she showed an aptitude for penetration testing and malware analysis. Her background as “blue team” uniquely prepared her for guiding clients through remediation and contextualizing findings for their environment. \n\n\n\nShe graduated with honors from Florida State College at Jacksonville’s networking program. While pursuing her degree\, she dedicated time to teaching computing skills to underrepresented minorities. Jennifer continues to be passionate about teaching and is eager to share her knowledge with anyone who will listen. \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nOil\, Circuits\, and CheeseDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-oil-circuits-cheese-an-additive-model-of-failure-with-jennifer-shannon/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Oil-Circuits-Cheese_-An-Additive-Model-of-Failure_Jennifer-Shannon.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20231122T120000
DTEND;TZID=America/New_York:20231122T130000
DTSTAMP:20260403T125149
CREATED:20240910T161101Z
LAST-MODIFIED:20240910T161102Z
UID:10000627-1700654400-1700658000@www.antisyphontraining.com
SUMMARY:Anti-Cast: How to Write an Adduser Shellcode with Marco Lux
DESCRIPTION:This Anti-Cast jumps right into writing a linux 32Bit shellcode\, for adding a new uid 0 user to the system passwd file. \n\n\n\nWith 20 years of experience in the field\, Marco has developed a strong interest in computer security\, hacking\, and penetration testing. \n\n\n\nThroughout his career\, he has specialized in breaking network \n\n\n\ninfrastructures and web applications. He has also gained hardware knowledge and red teaming experience. \n\n\n\nWhat sets Marco apart is his fascination with network protocol analysis and low-level computing. Throughout his journey\, Marco authored tools related to security vulnerabilities and uncovered several critical issues. \n\n\n\nAs a speaker and trainer at security events\, he shared his knowledge and insights on a variety of security subjects. \n\n\n\nOutside of cybersecurity\, Marco takes pleasure in cycling and exploring the great outdoors.  \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nHow to Write an Adduser ShellcodeDownload the slides here!\n\n\n\nShellcode – Adduser LabDownload the lab instructions here!
URL:https://www.antisyphontraining.com/event/anti-cast-how-to-write-an-adduser-shellcode-with-marco-lux/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/How-to-Write-an-Adduser-Shellcode_Marco-Lux.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20231115T120000
DTEND;TZID=America/New_York:20231115T130000
DTSTAMP:20260403T125149
CREATED:20240910T161429Z
LAST-MODIFIED:20240910T161430Z
UID:10000628-1700049600-1700053200@www.antisyphontraining.com
SUMMARY:Anti-Cast: Enterprise DFIR Investigation Scenario with Markus Schober
DESCRIPTION:Based on a compromised employee workstation scenario\, we’ll discuss how to conduct an effective DFIR investigation within enterprise environments\, following the incident response lifecycle. We’ll discuss triage and containment considerations\, as well as elaborate on best practices for performing effective data collections and forensic analysis. To wrap up\, we will discuss critical remediations and post-incident activities that should be taken into account. \n\n\n\n  \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nEnterprise DFIR Investigation Scenario with Markus SchoberDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-enterprise-dfir-investigation-scenario-with-markus-schober/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Enterprise-DFIR-Investigation-Scenario_Markus-Schober.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20231108T120000
DTEND;TZID=America/New_York:20231108T130000
DTSTAMP:20260403T125149
CREATED:20240910T161749Z
LAST-MODIFIED:20240910T161750Z
UID:10000629-1699444800-1699448400@www.antisyphontraining.com
SUMMARY:Anti-Cast: Go St*lk Yourself - Privacy Through OSINT with Mishaal Khan
DESCRIPTION:It’s always scary to Google yourself and see what you find. \n\n\n\nIn this session\, we dive into the eerie reality of personal information exposure on the internet. We’ll look at some of the resources stalkers use to get information on their victims. The combination of home address\, phone number\, email\, social media profiles\, and even family relatives can be a gold mine for stalkers. Don’t miss this opportunity to strengthen your online privacy from the lens of an OSINT expert. You’ll learn the best strategies to get your personal information out of the internet and escape the perils of stalking\, doxing\, swatting\, or account hijacking. Your digital safety is at stake – let’s be prepared! \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com
URL:https://www.antisyphontraining.com/event/anti-cast-go-stlk-yourself-privacy-through-osint-with-mishaal-khan/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Go-Stlk-Yourself_Privacy-through-OSINT_Mishaal-Khan.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20231101T120000
DTEND;TZID=America/New_York:20231101T130000
DTSTAMP:20260403T125149
CREATED:20240910T162316Z
LAST-MODIFIED:20240910T162317Z
UID:10000630-1698840000-1698843600@www.antisyphontraining.com
SUMMARY:Anti-Cast: Next Hands-On IR D&D Style Webcast with John Strand and Douglas Brush
DESCRIPTION:In our last incident response webcast\, we may have been responsible for bringing down GitHub. I have been told that it is just not possible. You can see the recording of that webcast here: https://youtube.com/live/n8aE5bwPLog Judge for yourself….  \n\n\n\nIn this next webcast\, we will have backups. You know\, just in case. For this webcast\, we will have a panel of surprise guests pretending to be characters for a D&D style IR story. But\, the catch is you will all do the hands-on work with actual evidence of an actual attack. (That we simulated in a lab.) Sorry\, not doing this with real IR data. Not today\, Satan. Not today. As always with these IR scenarios\, full logfiles and a walkthrough will be provided after the event. \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com
URL:https://www.antisyphontraining.com/event/anti-cast-next-hands-on-ir-dd-style-webcast-with-john-strand-and-douglas-brush/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Next-Hands-On-IR-DD-Style-Webcast_John-and-Douglas.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20231025T120000
DTEND;TZID=America/New_York:20231025T130000
DTSTAMP:20260403T125149
CREATED:20240910T162906Z
LAST-MODIFIED:20240910T162908Z
UID:10000631-1698235200-1698238800@www.antisyphontraining.com
SUMMARY:Anti-Cast: Horrors of Cybersecurity -  Tabletops\, Playbooks\, & Bots! with Amanda Berlin and Jeremy Mio
DESCRIPTION:This frightful webcast introduces ghoulish training exercises\, creepy incident response playbooks\, and spine-chilling after-action reports to help you prepare for a hair-raising cyberattack. \n\n\n\n\nTerror Tabletops (TTXs): Planning scary cybersecurity scenarios to test your defenses against the forces of darkness\n\n\n\nMacabre Playbooks: Developing creepy incident response plans to stop cyber monsters in their tracks\n\n\n\nHaunted Gamification: Making your exercise fun yet frightening with interactive elements to engage your team\n\n\n\nGame Bot Overview & Mini Haunting: A quick look at using chatbots to automate your horror-themed exercises\n\n\n\n\nGet ready for a thrilling webcast that will help you confront your deepest cybersecurity fears! Let’s start planning a terrifyingly effective cyber exercise for this Halloween season.  \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nHorrors of Cybersecurity – Tabletops\, Playbooks\, & Bots with Amanda and JeremyDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-horrors-of-cybersecurity-tabletops-playbooks-bots-with-amanda-berlin-and-jeremy-mio/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Horrors-of-Cybersecurity_Tabletops-Playbooks-Bots_Amanda-and-Jeremy.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20231011T120000
DTEND;TZID=America/New_York:20231011T130000
DTSTAMP:20260403T125149
CREATED:20240910T163250Z
LAST-MODIFIED:20240910T163251Z
UID:10000632-1697025600-1697029200@www.antisyphontraining.com
SUMMARY:Anti-Cast: Tales of AV/EDR Bypass - Double Feature with Greg Hatcher and John Stigerwalt
DESCRIPTION:First Showing:Delve into the realm of compiler tactics to navigate AV and EDR safeguards. Discover the potential of Cobalt Strike payloads to sidestep these security measures. Explore compilers like Clang++\, LLVM\, and G++\, showcasing their role in reshaping security strategies. \n\n\n\nBy showcasing submissions aimed at diverse vendors\, underscore the simplicity with which this shift can reintroduce invisibility to payloads. You’ll get sample code\, enabling you to explore these strategies on your own. \n\n\n\nSecond Showing:Shellcode loaders evolution has been interesting\, however\, some AV/EDR products have begun detecting the usage of direct and indirect syscalls in malware. \n\n\n\nBut what if we didn’t hard-code syscalls or even jump to a syscall region? This presentation is a deep dive into using a specific set of Windows callbacks working within their own thread pools. \n\n\n\nAttendees should expect to learn how to call Windows APIs using ROP gadgets\, basics of ROP\, and why current detection mechanisms won’t work against this attack. This is the next evolution of calling Windows APIs in malware.  \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com
URL:https://www.antisyphontraining.com/event/anti-cast-tales-of-av-edr-bypass-double-feature-with-greg-hatcher-and-john-stigerwalt/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Tales-of-AV_EDR-Bypass-Double-Feature_Greg-Hatcher-John-Stigerwalt.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20231004T120000
DTEND;TZID=America/New_York:20231004T130000
DTSTAMP:20260403T125149
CREATED:20240910T164028Z
LAST-MODIFIED:20240910T164029Z
UID:10000633-1696420800-1696424400@www.antisyphontraining.com
SUMMARY:Anti-Cast: Applying WWII-Era Analytic Techniques to CTI with Jake Williams
DESCRIPTION:Everything old is new again\, including intelligence analytic techniques. In today’s webcast\, Jake will introduce you to Kent’s Analytic Doctrine\, a formal intelligence analysis doctrine developed and refined in WWII. You don’t need to be a CTI analyst to benefit from this webcast. Practically every job in cybersecurity requires some level of analysis and understanding analytic models will make you better. We’ll even walk through some case studies from WWII showing how this timeless doctrine works for challenges both in and out of cyber. Then we’ll discuss how you can use these explicitly in cyber threat intelligence to provide better rigor in your cyber analysis. \n\n\n\n \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nApplying WWII-Era Analytic Techniques to CTIDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-applying-wwii-era-analytic-techniques-to-cti-with-jake-williams/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Applying-WWII-Era-Analytic-Techniques-to-CTI_Jake-Williams.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230927T120000
DTEND;TZID=America/New_York:20230927T130000
DTSTAMP:20260403T125149
CREATED:20240910T171909Z
LAST-MODIFIED:20240910T171910Z
UID:10000634-1695816000-1695819600@www.antisyphontraining.com
SUMMARY:Anti-Cast: Infiltrating Kubernetes - Attacker Motives and Methods with Cory Sabol
DESCRIPTION:In this one-hour webinar\, we will explore an overview of the threats targeting Kubernetes\, a crucial technology for managing containerized applications. “Infiltrating Kubernetes: An Overview of Attacker Motives and Methods\,” aims to equip IT professionals\, DevOps engineers\, and cybersecurity enthusiasts with insights into why and how attackers infiltrate Kubernetes environments.We will briefly introduce Kubernetes principles\, then move to analyze the motivations behind its attacks\, spotlighting the various attack vectors and potential vulnerabilities within Kubernetes clusters. Participants will learn about advanced threats\, including exploitation of misconfigurations\, privilege abuses\, and container escape techniques. \n\n\n\nFinally\, we will cap the session off with a live demo of an advanced container escape technique! \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nInfiltrating Kubernetes- Attacker Motives and MethodsDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-infiltrating-kubernetes-attacker-motives-and-methods-with-cory-sabol/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Infiltrating-Kubernetes_-Attacker-Motives-and-Methods_Cory-Sabol.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230920T120000
DTEND;TZID=America/New_York:20230920T130000
DTSTAMP:20260403T125149
CREATED:20240911T191610Z
LAST-MODIFIED:20240911T191611Z
UID:10000635-1695211200-1695214800@www.antisyphontraining.com
SUMMARY:Anti-Cast: API-ocalypse Now with Jennifer Shannon
DESCRIPTION:Get ready for a wild ride as Jennifer Shannon\, a Senior Security Consultant at Secure Ideas\, presents “API-ocalypse Now.” In this thrilling and entertaining webcast\, Jennifer will showcase the vulnerabilities lurking within APIs and the havoc they can wreak if left unaddressed. Through live pentesting demos\, she will demonstrate jaw-dropping exploits\, mind-bending injection attacks\, and authentication bypass techniques that will leave you on the edge of your seat. Join Jennifer as she navigates the dark side of APIs to help you understand and fortify your attack surface in order to prevent the impending API-ocalypse. \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nAPI-ocalypse Now with Jennifer ShannonDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-api-ocalypse-now-with-jennifer-shannon/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/API-ocalypse-Now_Jennifer-Shannon.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230913T120000
DTEND;TZID=America/New_York:20230913T130000
DTSTAMP:20260403T125149
CREATED:20240911T191840Z
LAST-MODIFIED:20240911T191841Z
UID:10000636-1694606400-1694610000@www.antisyphontraining.com
SUMMARY:Anti-Cast: Credential Compartmentalization in Active Directory with Eric Kuehn
DESCRIPTION:When it comes to security\, the goal is to make an attacker’s job as difficult as possible. The more hurdles they must jump through\, the easier it should be to detect and stop them. Unfortunately\, common practices around how and where privileged accounts are used in Windows environments reduces the race down to only a couple of jumps (or maybe just a sprint). We will talk about why device and account tiering is critically important for making a network a virtual obstacle course. \n\n\n\n \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nCredential Compartmentalization in Active Directory with Eric KuehnDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-credential-compartmentalization-in-active-directory-with-eric-kuehn/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Credential-Compartmentalization-in-Active-Directory_Eric-Kuehn.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230906T120000
DTEND;TZID=America/New_York:20230906T130000
DTSTAMP:20260403T125149
CREATED:20240911T192109Z
LAST-MODIFIED:20240911T192109Z
UID:10000637-1694001600-1694005200@www.antisyphontraining.com
SUMMARY:Anti-Cast: The Wrong Beer to the Barbecue - BYOVD Attacks with Alissa Torres
DESCRIPTION:Based on recent threat reports\, a growing number of bad actors are bringing vulnerable drivers to victim environments to exploit and guarantee a more successful attack path. These kernel drivers are legitimate\, trusted and… vulnerable!  Amazingly\, some have CVEs dating back to 2015 or earlier. During this Anti-Cast\, we will map out detection methods to identify and remove vulnerable drivers already present in your network AND devise prevent/block strategies to future-proof against BYOVD attacks.  \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nThe Wrong Beer to the Barbecue with Alissa TorresDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-the-wrong-beer-to-the-barbecue-byovd-attacks-with-alissa-torres/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/The-Wrong-Beer-to-the-Barbecue_Alissa-Torres.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230830T120000
DTEND;TZID=America/New_York:20230830T130000
DTSTAMP:20260403T125149
CREATED:20240911T202902Z
LAST-MODIFIED:20240911T202903Z
UID:10000638-1693396800-1693400400@www.antisyphontraining.com
SUMMARY:Anti-Cast: Exploring PowerShell Logging with TellTail with Carrie Roberts
DESCRIPTION:TellTail is a free and open source application that makes it easy to view and learn about PowerShell logging. In this webcast we will enable/disable the various PowerShell logging options and watch the effect it has on what gets logged. Come to this webcast to learn more about PowerShell Script Block and Module logging and how you can easily explore and learn on your own. \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nExploring PowerShell Logging with TellTailDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-exploring-powershell-logging-with-telltail-with-carrie-roberts/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Exploring-PowerShell-Logging-with-TellTail_Carrie-Roberts.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230816T120000
DTEND;TZID=America/New_York:20230816T130000
DTSTAMP:20260403T125149
CREATED:20240911T203333Z
LAST-MODIFIED:20240911T203335Z
UID:10000639-1692187200-1692190800@www.antisyphontraining.com
SUMMARY:Anti-Cast: XFS Forensics with xfs_db with Hal Pomeranz
DESCRIPTION:Despite being a common Linux file system\, forensic support for XFS is still largely lacking. In this session\, Hal will describe how to turn the humble xfs_db tool into a useful forensic application for examining XFS file system internals and finding critical evidence. Attackers aren’t the only ones who can “live off the land”! \n\n\n\n \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nXFS Forensics with xfs_db with Hal PomeranzDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-xfs-forensics-with-xfs_db-with-hal-pomeranz/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/XFS-Forensics-with-xfs_db_Hal-Pomeranz.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230809T120000
DTEND;TZID=America/New_York:20230809T130000
DTSTAMP:20260403T125149
CREATED:20240911T204802Z
LAST-MODIFIED:20240911T204803Z
UID:10000640-1691582400-1691586000@www.antisyphontraining.com
SUMMARY:Anti-Cast: Down with the CISO with Nathan Case
DESCRIPTION:Chat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com
URL:https://www.antisyphontraining.com/event/anti-cast-down-with-the-ciso-with-nathan-case/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Down-with-the-CISO_Nathan-Case.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230802T120000
DTEND;TZID=America/New_York:20230802T130000
DTSTAMP:20260403T125149
CREATED:20240911T205633Z
LAST-MODIFIED:20240911T205635Z
UID:10000641-1690977600-1690981200@www.antisyphontraining.com
SUMMARY:Anti-Cast: Obtaining NETNLM Hashes by Asking Nicely with Qasim Ijaz and Jake Nelson
DESCRIPTION:Active Directory loves spewing hashes\, all kinds of them. This talk will focus on NetNTLM (or NTLM\, call it what you will) hashes. We’ll chat about how they can be obtained and used for privilege escalation and lateral movement. Here’s what we’ll cover: \n\n\n\n\nWhat NetNTLM hashes are and how they fit into AD\n\n\n\nDifferent ways to get NetNTLM hashes\n\n\n\nBroadcast and multicast-based name resolution protocols\n\n\n\nCoercion and elicitation (PetitPotam\, DFSCoerce\, shortcut files/ icons\, and even Microsoft Word)\n\n\n\nHow to crack and relay NetNTLM hashes\n\n\n\nHow to defend yourself against these types of attacks\n\n\n\n\nWe’ll break down each topic and will demonstrate some tools and techniques you can use to get and utilize NetNTLM hashes. \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nObtaining NetNTLM Hashes by Asking NicelyDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-obtaining-netnlm-hashes-by-asking-nicely-with-qasim-ijaz-and-jake-nelson/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Obtaining-NetNTLM-Hashes-by-Asking-Nicely_Qasim-Ijaz-Jake-Nelson.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230726T120000
DTEND;TZID=America/New_York:20230726T130000
DTSTAMP:20260403T125149
CREATED:20240911T210048Z
LAST-MODIFIED:20240911T210050Z
UID:10000642-1690372800-1690376400@www.antisyphontraining.com
SUMMARY:Anti-Cast: OSINT Uncovered - Unlocking the Hidden Gems of Online Information with Mishaal Khan
DESCRIPTION:This Anti-Cast session explores advanced techniques and tools for extracting valuable information from diverse online platforms\, social media\, public databases\, and breaches. By emphasizing responsible approaches to OSINT\, attendees will learn how to navigate vast data sources\, analyze digital footprints\, and uncover the hidden gems of online information. Learn to harness the power of OSINT\, as Mishaal walks you through some quick OSINT demos. Stalkers not allowed! \n\n\n\n \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nOSINT Uncovered with Mishaal KhanDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-osint-uncovered-unlocking-the-hidden-gems-of-online-information-with-mishaal-khan/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/OSINT-Uncovered_Unlocking-the-Hidden-Gems-of-Online-Information-w_-Mishaal-Khan.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230719T120000
DTEND;TZID=America/New_York:20230719T130000
DTSTAMP:20260403T125149
CREATED:20240911T210450Z
LAST-MODIFIED:20240911T210451Z
UID:10000643-1689768000-1689771600@www.antisyphontraining.com
SUMMARY:Anti-Cast: The Symon Update is Here with Gerard Johansen
DESCRIPTION:The long-awaited update to Sysmon is here. Microsoft has recently released version 15. This updated version of the popular logging tool includes new features and provides responders insight into endpoint behavior. In this Anti-Cast\, Gerard Johansen\, digital forensics practitioner and course author of Enterprise Forensics and Response will walk through how Sysmon can aid in incident investigations. Gerard will provide an overview of Sysmon\, including what data analysts can see\, how to deploy and configure and finally looking at how Sysmon can aid in incident investigations. How configurations can be tailored. Local and remote acquisition of Sysmon log files and finally how to analyze various Tactics and Techniques commonly seen in incident investigations. \n\n\n\n \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nThe Sysmon Update is Here with Gerard JohansenDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-the-symon-update-is-here-with-gerard-johansen/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/The-Sysmon-Update-is-Here-w_-Gerard-Johansen.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230712T120000
DTEND;TZID=America/New_York:20230712T130000
DTSTAMP:20260403T125149
CREATED:20240911T210818Z
LAST-MODIFIED:20240911T210819Z
UID:10000644-1689163200-1689166800@www.antisyphontraining.com
SUMMARY:Anti-Cast: Forensicating Linux LD_PRELOAD Rootkits with Hal Pomeranz
DESCRIPTION:Widespread availability of PoC Linux LD_PRELOAD rootkits means that even trivial cryptomining attacks are starting to deploy them. This talk demonstrates a simple LD_PRELOAD rootkit and techniques for detecting them in a live response scenario and by memory analysis. Get the jump on your adversaries with this fast-paced\, practical introduction.  \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nForensicating Linux LD_PRELOAD Rootkits with Hal PomeranzDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-forensicating-linux-ld_preload-rootkits-with-hal-pomeranz/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Forensicating-Linux-LD_PRELOAD-Rootkits-w_-Hal-Pomeranz.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230628T120000
DTEND;TZID=America/New_York:20230628T130000
DTSTAMP:20260403T125149
CREATED:20240911T213014Z
LAST-MODIFIED:20240911T213015Z
UID:10000645-1687953600-1687957200@www.antisyphontraining.com
SUMMARY:Anti-Cast: Strengthening Your Blue Teaming Skills - Thinking Like an Attacker with Markus Schober
DESCRIPTION:This webcast will explore the vast amount of challenges faced by blue teamers and how they can stay ahead of the curve. Through a ransomware attack example\, we’ll discuss the broad range of skills and knowledge needed to respond effectively to advanced threats. We’ll elaborate on how thinking like an attacker and employing a purple teaming approach for skills development has proven to be the best defense for many blue teamers. The session will conclude with a Q&A portion to provide answers on what and how blue teamers need to upskill. \n\n\n\n \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nStrengthening Your Blue Teaming Skills Thinking Like an AttackerDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-strengthening-your-blue-teaming-skills-thinking-like-an-attacker-with-markus-schober/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Strengthening-Your-Blue-Teaming-Skills-Thinking-Like-an-Attacker-w-Markus-Schober_USE.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230621T120000
DTEND;TZID=America/New_York:20230621T130000
DTSTAMP:20260403T125149
CREATED:20240911T214149Z
LAST-MODIFIED:20240911T214150Z
UID:10000646-1687348800-1687352400@www.antisyphontraining.com
SUMMARY:Anti-Cast: Linux Command Line Dojo - You Can Teach an Old Dog New Tricks with Hal Pomeranz
DESCRIPTION:If you’ve been using the Linux command line for a long time\, you may have missed out on some sweet new features of common commands that can make your life much better. Join Sensei Hal as we break down some practical examples and demonstrate some useful new functionality.  \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nLinux Command Line Dojo – You Can Teach an Old Dog New TricksDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-linux-command-line-dojo-you-can-teach-an-old-dog-new-tricks-with-hal-pomeranz/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/LinuxCommandLineDojo.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230531T120000
DTEND;TZID=America/New_York:20230531T130000
DTSTAMP:20260403T125149
CREATED:20240911T214524Z
LAST-MODIFIED:20240911T214525Z
UID:10000647-1685534400-1685538000@www.antisyphontraining.com
SUMMARY:Anti-Cast: Is That Toaster on Your Threat Model? with Nathan Sweaney and Kathy Collins
DESCRIPTION:Chat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com
URL:https://www.antisyphontraining.com/event/anti-cast-is-that-toaster-on-your-threat-model-with-nathan-sweaney-and-kathy-collins/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Is-that-toaster-on-your-threat-model_graphic.png
END:VEVENT
END:VCALENDAR