BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Antisyphon Training - ECPv6.15.17.1//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Antisyphon Training
X-ORIGINAL-URL:https://www.antisyphontraining.com
X-WR-CALDESC:Events for Antisyphon Training
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20220313T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20221106T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20231101T120000
DTEND;TZID=America/New_York:20231101T130000
DTSTAMP:20260403T220318
CREATED:20240910T162316Z
LAST-MODIFIED:20240910T162317Z
UID:10000630-1698840000-1698843600@www.antisyphontraining.com
SUMMARY:Anti-Cast: Next Hands-On IR D&D Style Webcast with John Strand and Douglas Brush
DESCRIPTION:In our last incident response webcast\, we may have been responsible for bringing down GitHub. I have been told that it is just not possible. You can see the recording of that webcast here: https://youtube.com/live/n8aE5bwPLog Judge for yourself….  \n\n\n\nIn this next webcast\, we will have backups. You know\, just in case. For this webcast\, we will have a panel of surprise guests pretending to be characters for a D&D style IR story. But\, the catch is you will all do the hands-on work with actual evidence of an actual attack. (That we simulated in a lab.) Sorry\, not doing this with real IR data. Not today\, Satan. Not today. As always with these IR scenarios\, full logfiles and a walkthrough will be provided after the event. \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com
URL:https://www.antisyphontraining.com/event/anti-cast-next-hands-on-ir-dd-style-webcast-with-john-strand-and-douglas-brush/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Next-Hands-On-IR-DD-Style-Webcast_John-and-Douglas.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20231025T120000
DTEND;TZID=America/New_York:20231025T130000
DTSTAMP:20260403T220318
CREATED:20240910T162906Z
LAST-MODIFIED:20240910T162908Z
UID:10000631-1698235200-1698238800@www.antisyphontraining.com
SUMMARY:Anti-Cast: Horrors of Cybersecurity -  Tabletops\, Playbooks\, & Bots! with Amanda Berlin and Jeremy Mio
DESCRIPTION:This frightful webcast introduces ghoulish training exercises\, creepy incident response playbooks\, and spine-chilling after-action reports to help you prepare for a hair-raising cyberattack. \n\n\n\n\nTerror Tabletops (TTXs): Planning scary cybersecurity scenarios to test your defenses against the forces of darkness\n\n\n\nMacabre Playbooks: Developing creepy incident response plans to stop cyber monsters in their tracks\n\n\n\nHaunted Gamification: Making your exercise fun yet frightening with interactive elements to engage your team\n\n\n\nGame Bot Overview & Mini Haunting: A quick look at using chatbots to automate your horror-themed exercises\n\n\n\n\nGet ready for a thrilling webcast that will help you confront your deepest cybersecurity fears! Let’s start planning a terrifyingly effective cyber exercise for this Halloween season.  \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nHorrors of Cybersecurity – Tabletops\, Playbooks\, & Bots with Amanda and JeremyDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-horrors-of-cybersecurity-tabletops-playbooks-bots-with-amanda-berlin-and-jeremy-mio/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Horrors-of-Cybersecurity_Tabletops-Playbooks-Bots_Amanda-and-Jeremy.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20231011T120000
DTEND;TZID=America/New_York:20231011T130000
DTSTAMP:20260403T220318
CREATED:20240910T163250Z
LAST-MODIFIED:20240910T163251Z
UID:10000632-1697025600-1697029200@www.antisyphontraining.com
SUMMARY:Anti-Cast: Tales of AV/EDR Bypass - Double Feature with Greg Hatcher and John Stigerwalt
DESCRIPTION:First Showing:Delve into the realm of compiler tactics to navigate AV and EDR safeguards. Discover the potential of Cobalt Strike payloads to sidestep these security measures. Explore compilers like Clang++\, LLVM\, and G++\, showcasing their role in reshaping security strategies. \n\n\n\nBy showcasing submissions aimed at diverse vendors\, underscore the simplicity with which this shift can reintroduce invisibility to payloads. You’ll get sample code\, enabling you to explore these strategies on your own. \n\n\n\nSecond Showing:Shellcode loaders evolution has been interesting\, however\, some AV/EDR products have begun detecting the usage of direct and indirect syscalls in malware. \n\n\n\nBut what if we didn’t hard-code syscalls or even jump to a syscall region? This presentation is a deep dive into using a specific set of Windows callbacks working within their own thread pools. \n\n\n\nAttendees should expect to learn how to call Windows APIs using ROP gadgets\, basics of ROP\, and why current detection mechanisms won’t work against this attack. This is the next evolution of calling Windows APIs in malware.  \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com
URL:https://www.antisyphontraining.com/event/anti-cast-tales-of-av-edr-bypass-double-feature-with-greg-hatcher-and-john-stigerwalt/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Tales-of-AV_EDR-Bypass-Double-Feature_Greg-Hatcher-John-Stigerwalt.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20231004T120000
DTEND;TZID=America/New_York:20231004T130000
DTSTAMP:20260403T220318
CREATED:20240910T164028Z
LAST-MODIFIED:20240910T164029Z
UID:10000633-1696420800-1696424400@www.antisyphontraining.com
SUMMARY:Anti-Cast: Applying WWII-Era Analytic Techniques to CTI with Jake Williams
DESCRIPTION:Everything old is new again\, including intelligence analytic techniques. In today’s webcast\, Jake will introduce you to Kent’s Analytic Doctrine\, a formal intelligence analysis doctrine developed and refined in WWII. You don’t need to be a CTI analyst to benefit from this webcast. Practically every job in cybersecurity requires some level of analysis and understanding analytic models will make you better. We’ll even walk through some case studies from WWII showing how this timeless doctrine works for challenges both in and out of cyber. Then we’ll discuss how you can use these explicitly in cyber threat intelligence to provide better rigor in your cyber analysis. \n\n\n\n \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nApplying WWII-Era Analytic Techniques to CTIDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-applying-wwii-era-analytic-techniques-to-cti-with-jake-williams/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Applying-WWII-Era-Analytic-Techniques-to-CTI_Jake-Williams.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230927T120000
DTEND;TZID=America/New_York:20230927T130000
DTSTAMP:20260403T220318
CREATED:20240910T171909Z
LAST-MODIFIED:20240910T171910Z
UID:10000634-1695816000-1695819600@www.antisyphontraining.com
SUMMARY:Anti-Cast: Infiltrating Kubernetes - Attacker Motives and Methods with Cory Sabol
DESCRIPTION:In this one-hour webinar\, we will explore an overview of the threats targeting Kubernetes\, a crucial technology for managing containerized applications. “Infiltrating Kubernetes: An Overview of Attacker Motives and Methods\,” aims to equip IT professionals\, DevOps engineers\, and cybersecurity enthusiasts with insights into why and how attackers infiltrate Kubernetes environments.We will briefly introduce Kubernetes principles\, then move to analyze the motivations behind its attacks\, spotlighting the various attack vectors and potential vulnerabilities within Kubernetes clusters. Participants will learn about advanced threats\, including exploitation of misconfigurations\, privilege abuses\, and container escape techniques. \n\n\n\nFinally\, we will cap the session off with a live demo of an advanced container escape technique! \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nInfiltrating Kubernetes- Attacker Motives and MethodsDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-infiltrating-kubernetes-attacker-motives-and-methods-with-cory-sabol/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Infiltrating-Kubernetes_-Attacker-Motives-and-Methods_Cory-Sabol.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230920T120000
DTEND;TZID=America/New_York:20230920T130000
DTSTAMP:20260403T220318
CREATED:20240911T191610Z
LAST-MODIFIED:20240911T191611Z
UID:10000635-1695211200-1695214800@www.antisyphontraining.com
SUMMARY:Anti-Cast: API-ocalypse Now with Jennifer Shannon
DESCRIPTION:Get ready for a wild ride as Jennifer Shannon\, a Senior Security Consultant at Secure Ideas\, presents “API-ocalypse Now.” In this thrilling and entertaining webcast\, Jennifer will showcase the vulnerabilities lurking within APIs and the havoc they can wreak if left unaddressed. Through live pentesting demos\, she will demonstrate jaw-dropping exploits\, mind-bending injection attacks\, and authentication bypass techniques that will leave you on the edge of your seat. Join Jennifer as she navigates the dark side of APIs to help you understand and fortify your attack surface in order to prevent the impending API-ocalypse. \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nAPI-ocalypse Now with Jennifer ShannonDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-api-ocalypse-now-with-jennifer-shannon/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/API-ocalypse-Now_Jennifer-Shannon.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230913T120000
DTEND;TZID=America/New_York:20230913T130000
DTSTAMP:20260403T220318
CREATED:20240911T191840Z
LAST-MODIFIED:20240911T191841Z
UID:10000636-1694606400-1694610000@www.antisyphontraining.com
SUMMARY:Anti-Cast: Credential Compartmentalization in Active Directory with Eric Kuehn
DESCRIPTION:When it comes to security\, the goal is to make an attacker’s job as difficult as possible. The more hurdles they must jump through\, the easier it should be to detect and stop them. Unfortunately\, common practices around how and where privileged accounts are used in Windows environments reduces the race down to only a couple of jumps (or maybe just a sprint). We will talk about why device and account tiering is critically important for making a network a virtual obstacle course. \n\n\n\n \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nCredential Compartmentalization in Active Directory with Eric KuehnDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-credential-compartmentalization-in-active-directory-with-eric-kuehn/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Credential-Compartmentalization-in-Active-Directory_Eric-Kuehn.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230906T120000
DTEND;TZID=America/New_York:20230906T130000
DTSTAMP:20260403T220318
CREATED:20240911T192109Z
LAST-MODIFIED:20240911T192109Z
UID:10000637-1694001600-1694005200@www.antisyphontraining.com
SUMMARY:Anti-Cast: The Wrong Beer to the Barbecue - BYOVD Attacks with Alissa Torres
DESCRIPTION:Based on recent threat reports\, a growing number of bad actors are bringing vulnerable drivers to victim environments to exploit and guarantee a more successful attack path. These kernel drivers are legitimate\, trusted and… vulnerable!  Amazingly\, some have CVEs dating back to 2015 or earlier. During this Anti-Cast\, we will map out detection methods to identify and remove vulnerable drivers already present in your network AND devise prevent/block strategies to future-proof against BYOVD attacks.  \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nThe Wrong Beer to the Barbecue with Alissa TorresDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-the-wrong-beer-to-the-barbecue-byovd-attacks-with-alissa-torres/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/The-Wrong-Beer-to-the-Barbecue_Alissa-Torres.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230830T120000
DTEND;TZID=America/New_York:20230830T130000
DTSTAMP:20260403T220318
CREATED:20240911T202902Z
LAST-MODIFIED:20240911T202903Z
UID:10000638-1693396800-1693400400@www.antisyphontraining.com
SUMMARY:Anti-Cast: Exploring PowerShell Logging with TellTail with Carrie Roberts
DESCRIPTION:TellTail is a free and open source application that makes it easy to view and learn about PowerShell logging. In this webcast we will enable/disable the various PowerShell logging options and watch the effect it has on what gets logged. Come to this webcast to learn more about PowerShell Script Block and Module logging and how you can easily explore and learn on your own. \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nExploring PowerShell Logging with TellTailDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-exploring-powershell-logging-with-telltail-with-carrie-roberts/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Exploring-PowerShell-Logging-with-TellTail_Carrie-Roberts.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230816T120000
DTEND;TZID=America/New_York:20230816T130000
DTSTAMP:20260403T220318
CREATED:20240911T203333Z
LAST-MODIFIED:20240911T203335Z
UID:10000639-1692187200-1692190800@www.antisyphontraining.com
SUMMARY:Anti-Cast: XFS Forensics with xfs_db with Hal Pomeranz
DESCRIPTION:Despite being a common Linux file system\, forensic support for XFS is still largely lacking. In this session\, Hal will describe how to turn the humble xfs_db tool into a useful forensic application for examining XFS file system internals and finding critical evidence. Attackers aren’t the only ones who can “live off the land”! \n\n\n\n \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nXFS Forensics with xfs_db with Hal PomeranzDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-xfs-forensics-with-xfs_db-with-hal-pomeranz/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/XFS-Forensics-with-xfs_db_Hal-Pomeranz.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230809T120000
DTEND;TZID=America/New_York:20230809T130000
DTSTAMP:20260403T220318
CREATED:20240911T204802Z
LAST-MODIFIED:20240911T204803Z
UID:10000640-1691582400-1691586000@www.antisyphontraining.com
SUMMARY:Anti-Cast: Down with the CISO with Nathan Case
DESCRIPTION:Chat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com
URL:https://www.antisyphontraining.com/event/anti-cast-down-with-the-ciso-with-nathan-case/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Down-with-the-CISO_Nathan-Case.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230802T120000
DTEND;TZID=America/New_York:20230802T130000
DTSTAMP:20260403T220318
CREATED:20240911T205633Z
LAST-MODIFIED:20240911T205635Z
UID:10000641-1690977600-1690981200@www.antisyphontraining.com
SUMMARY:Anti-Cast: Obtaining NETNLM Hashes by Asking Nicely with Qasim Ijaz and Jake Nelson
DESCRIPTION:Active Directory loves spewing hashes\, all kinds of them. This talk will focus on NetNTLM (or NTLM\, call it what you will) hashes. We’ll chat about how they can be obtained and used for privilege escalation and lateral movement. Here’s what we’ll cover: \n\n\n\n\nWhat NetNTLM hashes are and how they fit into AD\n\n\n\nDifferent ways to get NetNTLM hashes\n\n\n\nBroadcast and multicast-based name resolution protocols\n\n\n\nCoercion and elicitation (PetitPotam\, DFSCoerce\, shortcut files/ icons\, and even Microsoft Word)\n\n\n\nHow to crack and relay NetNTLM hashes\n\n\n\nHow to defend yourself against these types of attacks\n\n\n\n\nWe’ll break down each topic and will demonstrate some tools and techniques you can use to get and utilize NetNTLM hashes. \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nObtaining NetNTLM Hashes by Asking NicelyDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-obtaining-netnlm-hashes-by-asking-nicely-with-qasim-ijaz-and-jake-nelson/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Obtaining-NetNTLM-Hashes-by-Asking-Nicely_Qasim-Ijaz-Jake-Nelson.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230726T120000
DTEND;TZID=America/New_York:20230726T130000
DTSTAMP:20260403T220318
CREATED:20240911T210048Z
LAST-MODIFIED:20240911T210050Z
UID:10000642-1690372800-1690376400@www.antisyphontraining.com
SUMMARY:Anti-Cast: OSINT Uncovered - Unlocking the Hidden Gems of Online Information with Mishaal Khan
DESCRIPTION:This Anti-Cast session explores advanced techniques and tools for extracting valuable information from diverse online platforms\, social media\, public databases\, and breaches. By emphasizing responsible approaches to OSINT\, attendees will learn how to navigate vast data sources\, analyze digital footprints\, and uncover the hidden gems of online information. Learn to harness the power of OSINT\, as Mishaal walks you through some quick OSINT demos. Stalkers not allowed! \n\n\n\n \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nOSINT Uncovered with Mishaal KhanDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-osint-uncovered-unlocking-the-hidden-gems-of-online-information-with-mishaal-khan/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/OSINT-Uncovered_Unlocking-the-Hidden-Gems-of-Online-Information-w_-Mishaal-Khan.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230719T120000
DTEND;TZID=America/New_York:20230719T130000
DTSTAMP:20260403T220318
CREATED:20240911T210450Z
LAST-MODIFIED:20240911T210451Z
UID:10000643-1689768000-1689771600@www.antisyphontraining.com
SUMMARY:Anti-Cast: The Symon Update is Here with Gerard Johansen
DESCRIPTION:The long-awaited update to Sysmon is here. Microsoft has recently released version 15. This updated version of the popular logging tool includes new features and provides responders insight into endpoint behavior. In this Anti-Cast\, Gerard Johansen\, digital forensics practitioner and course author of Enterprise Forensics and Response will walk through how Sysmon can aid in incident investigations. Gerard will provide an overview of Sysmon\, including what data analysts can see\, how to deploy and configure and finally looking at how Sysmon can aid in incident investigations. How configurations can be tailored. Local and remote acquisition of Sysmon log files and finally how to analyze various Tactics and Techniques commonly seen in incident investigations. \n\n\n\n \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nThe Sysmon Update is Here with Gerard JohansenDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-the-symon-update-is-here-with-gerard-johansen/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/The-Sysmon-Update-is-Here-w_-Gerard-Johansen.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230712T120000
DTEND;TZID=America/New_York:20230712T130000
DTSTAMP:20260403T220318
CREATED:20240911T210818Z
LAST-MODIFIED:20240911T210819Z
UID:10000644-1689163200-1689166800@www.antisyphontraining.com
SUMMARY:Anti-Cast: Forensicating Linux LD_PRELOAD Rootkits with Hal Pomeranz
DESCRIPTION:Widespread availability of PoC Linux LD_PRELOAD rootkits means that even trivial cryptomining attacks are starting to deploy them. This talk demonstrates a simple LD_PRELOAD rootkit and techniques for detecting them in a live response scenario and by memory analysis. Get the jump on your adversaries with this fast-paced\, practical introduction.  \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nForensicating Linux LD_PRELOAD Rootkits with Hal PomeranzDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-forensicating-linux-ld_preload-rootkits-with-hal-pomeranz/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Forensicating-Linux-LD_PRELOAD-Rootkits-w_-Hal-Pomeranz.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230628T120000
DTEND;TZID=America/New_York:20230628T130000
DTSTAMP:20260403T220318
CREATED:20240911T213014Z
LAST-MODIFIED:20240911T213015Z
UID:10000645-1687953600-1687957200@www.antisyphontraining.com
SUMMARY:Anti-Cast: Strengthening Your Blue Teaming Skills - Thinking Like an Attacker with Markus Schober
DESCRIPTION:This webcast will explore the vast amount of challenges faced by blue teamers and how they can stay ahead of the curve. Through a ransomware attack example\, we’ll discuss the broad range of skills and knowledge needed to respond effectively to advanced threats. We’ll elaborate on how thinking like an attacker and employing a purple teaming approach for skills development has proven to be the best defense for many blue teamers. The session will conclude with a Q&A portion to provide answers on what and how blue teamers need to upskill. \n\n\n\n \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nStrengthening Your Blue Teaming Skills Thinking Like an AttackerDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-strengthening-your-blue-teaming-skills-thinking-like-an-attacker-with-markus-schober/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Strengthening-Your-Blue-Teaming-Skills-Thinking-Like-an-Attacker-w-Markus-Schober_USE.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230621T120000
DTEND;TZID=America/New_York:20230621T130000
DTSTAMP:20260403T220318
CREATED:20240911T214149Z
LAST-MODIFIED:20240911T214150Z
UID:10000646-1687348800-1687352400@www.antisyphontraining.com
SUMMARY:Anti-Cast: Linux Command Line Dojo - You Can Teach an Old Dog New Tricks with Hal Pomeranz
DESCRIPTION:If you’ve been using the Linux command line for a long time\, you may have missed out on some sweet new features of common commands that can make your life much better. Join Sensei Hal as we break down some practical examples and demonstrate some useful new functionality.  \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nLinux Command Line Dojo – You Can Teach an Old Dog New TricksDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-linux-command-line-dojo-you-can-teach-an-old-dog-new-tricks-with-hal-pomeranz/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/LinuxCommandLineDojo.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230531T120000
DTEND;TZID=America/New_York:20230531T130000
DTSTAMP:20260403T220318
CREATED:20240911T214524Z
LAST-MODIFIED:20240911T214525Z
UID:10000647-1685534400-1685538000@www.antisyphontraining.com
SUMMARY:Anti-Cast: Is That Toaster on Your Threat Model? with Nathan Sweaney and Kathy Collins
DESCRIPTION:Chat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com
URL:https://www.antisyphontraining.com/event/anti-cast-is-that-toaster-on-your-threat-model-with-nathan-sweaney-and-kathy-collins/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Is-that-toaster-on-your-threat-model_graphic.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230503T120000
DTEND;TZID=America/New_York:20230503T130000
DTSTAMP:20260403T220318
CREATED:20240911T214817Z
LAST-MODIFIED:20240911T214818Z
UID:10000648-1683115200-1683118800@www.antisyphontraining.com
SUMMARY:Anti-Cast: Enterprise Forensics and Response with Gerard Johansen
DESCRIPTION:In this Anti-Cast\, Gerard Johansen will give you a glimpse of his upcoming training class\, Enterprise Forensics and Response. Gerard’s course is designed to provide you with an understanding of the incident investigation process\, objective oriented analysis and response\, intrusion analysis and an exploration of attacker Tactics and Techniques. \n\n\n\n \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nEnterprise Forensics and Response with Gerard JohansenDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-enterprise-forensics-and-response-with-gerard-johansen/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Enterprise-Forensics-and-Response_graphic.png
END:VEVENT
END:VCALENDAR