BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Antisyphon Training - ECPv6.15.17.1//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Antisyphon Training
X-ORIGINAL-URL:https://www.antisyphontraining.com
X-WR-CALDESC:Events for Antisyphon Training
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20220313T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20221106T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240501T120000
DTEND;TZID=America/New_York:20240501T130000
DTSTAMP:20260405T021015
CREATED:20240904T165719Z
LAST-MODIFIED:20240904T165720Z
UID:10000615-1714564800-1714568400@www.antisyphontraining.com
SUMMARY:Anti-Cast: Security Split Divorcing Your Stack with Alissa Torres
DESCRIPTION:So your security team is convinced it needs to graduate to the newest “best” enterprise security tool\, I get it. \n\n\n\nBut for most\, this type of architecture shift requires careful planning and implementation. \n\n\n\nFor legacy tools\, you probably made concessions during onboarding\, accepted risks and grew product-specific dependencies. \n\n\n\nJoin us for a free one-hour Antisyphon Anti-cast with instructor\, Alissa Torres\, as she explains how to quantify the extent of your entanglement with your old flame(s) and how to smoothly onboard your next new thing. \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\n2024_05_01_anticast_Security Split Divorcing Your Stack_Alissa TorresDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-security-split-divorcing-your-stack-with-alissa-torres/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Divorcing-Your-Stack-w-Alissa-Torres1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240424T120000
DTEND;TZID=America/New_York:20240424T130000
DTSTAMP:20260405T021015
CREATED:20240904T150822Z
LAST-MODIFIED:20240904T150823Z
UID:10000608-1713960000-1713963600@www.antisyphontraining.com
SUMMARY:Anti-Cast: Learning from Macedonia: How InfoSec Fails Spawn from Sales & Marketing with Kevin Johnson and John Strand
DESCRIPTION:Join us for a free one-hour Antisyphon Anti-Cast\, with John Strand and Kevin Johnson. \n\n\n\nLearn how exaggeration undermines trust and efficiency. Using Alexander the Great’s empire as an analogy\, we highlight how overselling creates unrealistic expectations while critical vulnerabilities remain masked by marketing. \n\n\n\n\nEmpower yourselves with skills to challenge deceptive claims\n\n\n\nLearn how to critically evaluate infosec products and assertively address issues\n\n\n\nTogether\, we can promote honesty in the industry and fend off the snake oil\n\n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nLearning from Macedonia: How InfoSec Fails Spawn from Sales & MarketingDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-learning-from-macedonia-how-infosec-fails-spawn-from-sales-marketing-with-kevin-johnson-and-john-strand/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Learning-from-Macedonia-How-InfoSec-Fails-Spawn-from-Sales-amp-Marketing-John-amp-Kevin.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240424T120000
DTEND;TZID=America/New_York:20240424T130000
DTSTAMP:20260405T021015
CREATED:20240904T145728Z
LAST-MODIFIED:20240904T145729Z
UID:10000607-1713960000-1713963600@www.antisyphontraining.com
SUMMARY:Anti-Cast: Operationalizing Threat Intelligence with Derek Banks and Troy Wojewoda
DESCRIPTION:Got a threat intel feed and scared to use it? \n\n\n\nNo context on atomic indicators from your threat intel feed in your SIEM got you down? \n\n\n\nNot sure what threat intelligence even means? \n\n\n\nJoin us for a free one-hour Antisyphon Anti-Cast\, with instructors Derek Banks and Troy Wojewoda\, to gain insight on how they both produce and use various forms of threat intel at Black Hills Information Security (BHIS). \n\n\n\nThey’ll show you how we use atomic indicators and how Black Hills operationalizes more complex Tools\, Techniques\, and Procedures (TTPs) and provide examples of custom alerts that they use in the SOC that come from real-world threat actors. \n\n\n\nIf you have questions about threat intelligence\, please join us live and ask our instructors!  \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nOperationalizing Threat IntelligenceDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-operationalizing-threat-intelligence-with-derek-banks-and-troy-wojewoda/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/threat-intel.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240417T120000
DTEND;TZID=America/New_York:20240417T130000
DTSTAMP:20260405T021015
CREATED:20240904T151419Z
LAST-MODIFIED:20240904T151420Z
UID:10000609-1713355200-1713358800@www.antisyphontraining.com
SUMMARY:Anti-Cast: Hands on with the NIST Cybersecurity Framework 2.0 with Nathan Sweaney
DESCRIPTION:How do you measure cybersecurity maturity? \n\n\n\nAre you improving or falling behind? \n\n\n\nWhat should you prioritize next? \n\n\n\nIn this free one-hour Antisyphon Anti-Cast with instructor\, Nathan Sweaney\, he’ll explore the NIST Cybersecurity Framework 2.0 and practical applications for measuring your cybersecurity posture. \n\n\n\nAttendees will gain a firm understanding of the CSF and how to leverage it to drive improvements in their organization. \n\n\n\nNathan will also discuss the newly included concepts of Tiers and Profiles to tailor the CSF to your needs. \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nHands on with the NIST Cybersecurity Framework 2-0_Nathan SweaneyDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-hands-on-with-the-nist-cybersecurity-framework-2-0-with-nathan-sweaney/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Hands-on-with-the-NIST-Cybersecurity-Framework-2.0-Nathan-Sweaney.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240410T120000
DTEND;TZID=America/New_York:20240410T130000
DTSTAMP:20260405T021015
CREATED:20240904T151912Z
LAST-MODIFIED:20240904T151913Z
UID:10000610-1712750400-1712754000@www.antisyphontraining.com
SUMMARY:Anti-Cast: Secure Ideas Foundational Application Security Training with Bill McCauley
DESCRIPTION:Join us for a free one-hour Antisyphon Anti-Cast with Bill McCauley\, as he dives into the realm of application security from Secure Ideas’ foundational training class. \n\n\n\nHe’ll also navigate through the OWASP Top 10 application security vulnerabilities\, shedding light on common pitfalls and providing practical strategies to mitigate risks. \n\n\n\nAdditionally\, attendees will gain valuable insights into the realm of professional penetration testing\, discovering how it can enhance their security posture. \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nSecure Ideas Foundational Application Security Training with Bill McCauleyDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-secure-ideas-foundational-application-security-training-with-bill-mccauley/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Application-Security-Foundations–Bill-McCauley.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240403T120000
DTEND;TZID=America/New_York:20240403T130000
DTSTAMP:20260405T021015
CREATED:20240904T152339Z
LAST-MODIFIED:20240904T152413Z
UID:10000611-1712145600-1712149200@www.antisyphontraining.com
SUMMARY:Anti-Cast: AWS Cloud - DevSecOps Essentials with Andrew Krug
DESCRIPTION:We hear more and more about how to incorporate security into every phase of the software development lifecycle\, but: \n\n\n\nWhere do you start? \n\n\n\nWhat’s a priority? \n\n\n\nHow do I implement this? \n\n\n\nAll of these are common questions asked frequently by new cloud practitioners looking to build securely in their environments. \n\n\n\nJoin us for a free one-hour Antisyphon Anti-Cast with instructor\, Andrew Krug\, as he explores the fundamentals of DevSecOps as they relate to the AWS Cloud. \n\n\n\nYou’ll will gain an understanding of CI/CD architecture\, how to implement that architecture securely\, and get familiar with a variety of tools they can run to ensure that high velocity and security can exist in the same environment. \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nAWS Cloud – DevSecOps Essentials with Andrew KrugDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-aws-cloud-devsecops-essentials-with-andrew-krug/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/anti-thumbnail-12.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240327T120000
DTEND;TZID=America/New_York:20240327T130000
DTSTAMP:20260405T021015
CREATED:20240904T153310Z
LAST-MODIFIED:20240904T153310Z
UID:10000612-1711540800-1711544400@www.antisyphontraining.com
SUMMARY:Anti-Cast: Re-encoding Python Shellcode Execution with Joff Thyer
DESCRIPTION:Imagine\, if you will\, you’re a pen tester\, and you’ve gained access to a Windows application server. \n\n\n\nYour discovery includes a deployed application allow listing\, and a strong defensive solution stack. \n\n\n\nYour excitement increases as you find an installed Python interpreter. \n\n\n\nWouldn’t it be fantastic if you could use that Python interpreter to execute your favorite C2 framework shellcode\, allowing you to utilize your normal hacking toolset? \n\n\n\nYou’ve tried all your normal Python tricks\, however barriers persist. \n\n\n\nLet’s re-encode our shellcode for better success\, in this free one-hour Antisyphon Anti-Cast\, Re-encoding Python Shellcode Execution with Joff Thyer. \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nRe-encoding Python Shellcode Execution with Joff ThyerDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-re-encoding-python-shellcode-execution-with-joff-thyer/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Re-encoding-Python-Shellcode-Execution_Joff-Thyer.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240320T120000
DTEND;TZID=America/New_York:20240320T130000
DTSTAMP:20260405T021015
CREATED:20240904T153749Z
LAST-MODIFIED:20240904T153750Z
UID:10000613-1710936000-1710939600@www.antisyphontraining.com
SUMMARY:Anti-Cast: Threat Hunting with Velociraptor with Eric Capuano and Whitney Champion
DESCRIPTION:Velociraptor has been around for some time now\, but still too few practitioners have realized its full potential. \n\n\n\nFurthermore\, new and awesome features added recently nearly double its potential as an incident response (IR) Swiss Army Knife. \n\n\n\nIn this free one-hour Antisyphon Anti-Cast with Eric Capuano and Whitney Champion\, they’ll share tips and tricks for getting instant value with Velociraptor\, as well as updates they have planned for their next THVR course at Wild West Hackin’ Fest! \n\n\n\nEric Capuano is the CTO and co-founder of Recon InfoSec. He is also a certified SANS instructor of Digital Forensics and Incident Response\, and a former Cyber Warfare Operator in the Texas Air National Guard. \n\n\n\nWhitney Champion is a security architect\, engineer\, developer\, and co-founder of Recon InfoSec. \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com
URL:https://www.antisyphontraining.com/event/anti-cast-threat-hunting-with-velociraptor-with-eric-capuano-and-whitney-champion/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Threat-Hunting-with-Velociraptor_Eric-Whitney.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240306T120000
DTEND;TZID=America/New_York:20240306T130000
DTSTAMP:20260405T021015
CREATED:20240904T154205Z
LAST-MODIFIED:20240904T154206Z
UID:10000614-1709726400-1709730000@www.antisyphontraining.com
SUMMARY:Anti-Cast: Radioactive Vulnerabilities - Learn Secure Coding with Jennifer Shannon and Kathy Collins
DESCRIPTION:Tune in to ‘Radioactive Vulnerabilities – Learn Secure Coding’\, a free one-hour Antisyphon Anti-Cast that shares the tragic story of the Therac-25 radiation therapy incidents and how those incidents can teach us the significance of security testing before technology deployment. \n\n\n\nDuring this interactive Anti-Cast\, we always encourage our viewers to engage with our instructors and hosts\, so please join us and ask questions while Jennifer and Kathy explore: \n\n\n\n1. The need for security testing in software development \n\n\n\n2. Ways to implement security throughout development \n\n\n\n3. Understand the need to stay updated for industry best practices \n\n\n\nWe’re excited to learn with you! \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nRadioactive Vulnerabilities – Learn Secure CodingDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-radioactive-vulnerabilities-learn-secure-coding-with-jennifer-shannon-and-kathy-collins/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Radioactive-Vulnerabilities-Learn-Secure-Coding_Jennifer-and-Kathy.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240228T120000
DTEND;TZID=America/New_York:20240228T130000
DTSTAMP:20260405T021015
CREATED:20240904T171314Z
LAST-MODIFIED:20240904T171315Z
UID:10000616-1709121600-1709125200@www.antisyphontraining.com
SUMMARY:Anti-Cast: Intro to Software Defined Radio (SDR) for Space Signals Analysis with Tim Fowler
DESCRIPTION:In this free one-hour Antisyphon Anti-Cast\, Tim Fowler – Black Hills Information Security: Security Analyst\, will explore the versatile world of software-defined radio (SDR) and its application in satellite communication. \n\n\n\nAfter an introduction to SDR\, its capabilities\, and advantages over traditional radio systems\, the discussion shifts to practical application of using SDR for tapping into satellite signals. \n\n\n\nAttendees will learn about the types of satellites that can be monitored\, the setup process\, and the necessary equipment and software for successful satellite reception. \n\n\n\nThis Anti-cast includes real-life examples and demonstrations\, offering a hands-on understanding of capturing and decoding satellite signals. \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\n2024-02-28_anticast_Intro to Software Defined Radio (SDR) for Space Signals Analysis_Tim FowlerDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-intro-to-software-defined-radio-sdr-for-space-signals-analysis-with-tim-fowler/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Intro-to-Software-Defined-Radio-SDR-for-Space-Signals-Analysis_Tim-Fowler.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240221T120000
DTEND;TZID=America/New_York:20240221T130000
DTSTAMP:20260405T021015
CREATED:20240904T173604Z
LAST-MODIFIED:20240904T173606Z
UID:10000617-1708516800-1708520400@www.antisyphontraining.com
SUMMARY:Anti-Cast: How to Use 'Leaky Vessels' for Container Escape in Kubernetes with Jay Beales
DESCRIPTION:In this free one-hour Antisyphon Anti-cast\, Jay Beale – InGuardians CTO\, will teach you how to use the latest container escape\, “Leaky Vessels” (CVE-2024-21626)\, to break out of a Kubernetes pod and attack the cluster.  \n\n\n\nHe’ll also introduce KubeHound and Peirates\, two Kubernetes security tools.  You’ll learn how to use KubeHound to find multi-step attack paths through a Kubernetes cluster. \n\n\n\nOn the defensive side\, KubeHound is even more useful for finding those weak configurations so you can correct them. \n\n\n\nFinally\, you’ll see how to use Peirates (included in Kali Linux) to exploit those attack paths.  \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nWebinar-LeakyVessels-KubeHound-peiratesDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-how-to-use-leaky-vessels-for-container-escape-in-kubernetes-with-jay-beales/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/How-to-Use-Leaky-Vessels-for-Container-Escape-in-Kubernetes_Jay-Beale.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240214T120000
DTEND;TZID=America/New_York:20240214T130000
DTSTAMP:20260405T021015
CREATED:20240904T175738Z
LAST-MODIFIED:20240904T175822Z
UID:10000618-1707912000-1707915600@www.antisyphontraining.com
SUMMARY:Anti-Cast: For the Love of the Windows Search Index with Alissa Torres
DESCRIPTION:The Windows Search Indexer service does not just provide a fast way to locate and access a misplaced file\, this service’s database holds tremendous forensic value for host investigations. \n\n\n\nWith the recent introduction of efficient parsing tools\, analysts can gain access to these gems from the Indexer database: directory/file metadata\, content file summaries and user browser/activity logs. \n\n\n\nJoin Alissa Torres in this free one-hour Antisyphon Anti-Cast to learn how the Windows Search Index can augment your investigations. Fall in love with this under-rated artifact. \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\n2024_02_14_anticast_For the Love of the Windows Search Index_Alissa TorresDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-for-the-love-of-the-windows-search-index-with-alissa-torres/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/For-the-Love-of-the-Windows-Search-Index_Alissa-Torres.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240207T120000
DTEND;TZID=America/New_York:20240207T130000
DTSTAMP:20260405T021015
CREATED:20240905T195930Z
LAST-MODIFIED:20240905T195931Z
UID:10000619-1707307200-1707310800@www.antisyphontraining.com
SUMMARY:Anti-Cast: All About Systemd Timers with Hal Pomeranz
DESCRIPTION:The Linux-guru\, Hal Pomeranz\, returns for a free one-hour Antisypon Anti-cast! \n\n\n\nAs if Linux didn’t already have enough task scheduling mechanisms\, we now have “timers”—a highly configurable task scheduling mechanism implemented by Systemd. Threat actors are already starting to use Systemd timers for persistence. \n\n\n\nHal will cover the basics of configuring Systemd timers and how they operate\, plus forensic indicators you can look for to find any timers deployed in your systems. \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\n2024_02_07_anticast_All About Systemd Timers_Hal PomeranzDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-all-about-systemd-timers-with-hal-pomeranz/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/All-About-Systemd-Timers_Hal-Pomeranz.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240131T120000
DTEND;TZID=America/New_York:20240131T130000
DTSTAMP:20260405T021015
CREATED:20240905T200738Z
LAST-MODIFIED:20240905T200739Z
UID:10000620-1706702400-1706706000@www.antisyphontraining.com
SUMMARY:Anti-Cast: Active Directory Hacking-3 'New' Techniques with Eric Kuehn
DESCRIPTION:If you want to master the art of penetration testing\, you need to know how to exploit Active Directory (AD). \n\n\n\nIt’s the backbone of most networks and it holds the keys to the kingdom. But cracking it is not always easy. \n\n\n\nYou need to use the right tools and techniques for the job. \n\n\n\nIn this free one-hour Antisyphon Anti-Cast\, you’ll learn 3 different ways that can help you extract valuable information from AD\, modify its settings and gain full control over the network. \n\n\n\nThis Anti-Cast comes with practical demos and tips that will boost your hacking skills. \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\n2024_01_31_anticast_Active Directory Hacking-3 ‘New’ Techniques_Eric KuehnDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-active-directory-hacking-3-new-techniques-with-eric-kuehn/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Active-Directory-Hacking-3-New-Techniques-w_Eric-Kuehn.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240124T120000
DTEND;TZID=America/New_York:20240124T130000
DTSTAMP:20260405T021015
CREATED:20240905T205614Z
LAST-MODIFIED:20240905T210403Z
UID:10000621-1706097600-1706101200@www.antisyphontraining.com
SUMMARY:Anti-Cast: Cloud Identity Management for Everyone with Andrew Krug
DESCRIPTION:In every cloud\, Identity and Access Management are incredibly challenging for the most skilled practitioners. \n\n\n\nIn this free one-hour Antisyphon Anti-Cast we’ll review different cloud provider identity and access paradigms\, look at the systems for granting access\, and where the pitfalls are. \n\n\n\nWe’ll review the various grammars as well and demystify IAM for any user of any cloud. \n\n\n\nAttendees will leave with a firm understanding of how to go beyond the defaults. \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com
URL:https://www.antisyphontraining.com/event/anti-cast-cloud-identity-management-for-everyone-with-andrew-krug/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Cloud-Identity-Management-for-Everyone_Andrew-Krug.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240117T120000
DTEND;TZID=America/New_York:20240117T130000
DTSTAMP:20260405T021015
CREATED:20240905T212000Z
LAST-MODIFIED:20240905T212002Z
UID:10000622-1705492800-1705496400@www.antisyphontraining.com
SUMMARY:Anti-Cast: WMI Abuse: How Threat Actors Use WMI with Gerard Johansen
DESCRIPTION:In this free one-hour Antisyphon Anti-Cast\, Gerard Johansen\, Principal Readiness Engineer for Red Canary and Antisyphon instructor\, will run through how threat actors use the Windows Management Instrumentation (WMI) for Lateral Movement and Persistence. \n\n\n\nGerard will walk through how threat actors use WMI\, what trace evidence is left and how to analyze WMI abuse. \n\n\n\nFinally\, Gerard will walk through some demonstrations using Atomic Red Team and forensic tools. \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\n2024_01_17_anticast_WMI Abuse-How Threat Actors Use WMI_Gerard JohansenDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-wmi-abuse-how-threat-actors-use-wmi-with-gerard-johansen/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/WMI-Abuse_How-Threat-Actors-Use-WMI_Gerard-Johansen.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240110T120000
DTEND;TZID=America/New_York:20240110T130000
DTSTAMP:20260405T021015
CREATED:20240905T213657Z
LAST-MODIFIED:20240905T213658Z
UID:10000623-1704888000-1704891600@www.antisyphontraining.com
SUMMARY:Anti-Cast: New Year\, New Skills: Web App Pentesting with Jennifer Shannon
DESCRIPTION:In a world where web applications are the new battleground. \n\n\n\nHackers are constantly looking for ways to exploit them and steal your secrets\, sabotage your network\, or harm your customers. \n\n\n\nBut you are not alone… \n\n\n\nJennifer Shannon is here to help you fight back. \n\n\n\nIn this free one-hour Antisyphon Anti-cast\, Jennifer will teach you how to test your web applications and find the vulnerabilities before they do. \n\n\n\nShe will show you the tools\, the techniques\, and the tricks of the trade. \n\n\n\nThis is not just a Anti-cast… This is a mission. \n\n\n\nAre you ready to join? \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\n2024_01_10_anticast_New Year\, New Skills_Web App Pentesting_Jennifer ShannonDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-new-year-new-skills-web-app-pentesting-with-jennifer-shannon/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/New-Year-New-Skills_Web-App-Pentesting_Jennifer-Shannon.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20231220T120000
DTEND;TZID=America/New_York:20231220T130000
DTSTAMP:20260405T021015
CREATED:20240910T155521Z
LAST-MODIFIED:20240910T155522Z
UID:10000624-1703073600-1703077200@www.antisyphontraining.com
SUMMARY:Anti-Cast: Sharpening Your Skills - Web PenTesting with SamuraiWTF with Kevin Johnson
DESCRIPTION:Join us for an in-depth exploration in ‘Sharpening Your Skills: Web PenTesting with SamuraiWTF\,’ where we dive into the techniques and tools for web application security. \n\n\n\nThis talk is specially designed for those eager to elevate their web penetration testing skills using the OWASP Samurai Web Training Framework (SamuraiWTF). We will not just discuss but actively demonstrate the tools and targets within SamuraiWTF. The session is structured to provide a practical\, demo-heavy approach\, allowing attendees to see the tools and techniques in action. \n\n\n\nWhether you’re looking to refine your existing skills or explore new strategies in web security\, this session promises to be an engaging and deeply informative journey into the world of web penetration testing. \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com
URL:https://www.antisyphontraining.com/event/anti-cast-sharpening-your-skills-web-pentesting-with-samuraiwtf-with-kevin-johnson/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Sharpening-Your-Skills_Web-PenTesting-with-SamuraiWTF_Kevin-Johnson.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20231213T120000
DTEND;TZID=America/New_York:20231213T130000
DTSTAMP:20260405T021015
CREATED:20240910T155935Z
LAST-MODIFIED:20240910T155936Z
UID:10000625-1702468800-1702472400@www.antisyphontraining.com
SUMMARY:Anti-Cast: Triad of Success - Education\, Experience\, and Networking with Wade Wells
DESCRIPTION:In the ever-evolving landscape of professional development\, the triad of education\, experience\, and networking emerges as a foundational pillar for career growth and success. \n\n\n\nThis free one-hour Antisyphon Anti-Cast delves into the intricate interplay of these three crucial elements\, exploring how they individually and collectively influence career trajectories. \n\n\n\nWade aims to equip the audience with a comprehensive understanding of how education\, experience\, and networking function as key drivers in shaping a successful career. \n\n\n\nAttendees will leave with actionable insights and strategies to apply these principles in their own professional journeys. \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nTriad of Success – Education Experience and Networking with Wade WellsDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-triad-of-success-education-experience-and-networking-with-wade-wells/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Triad-of-Success_Education-Experience-and-Networking_Wade-Wells.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20231129T120000
DTEND;TZID=America/New_York:20231129T130000
DTSTAMP:20260405T021015
CREATED:20240910T160500Z
LAST-MODIFIED:20240910T160501Z
UID:10000626-1701259200-1701262800@www.antisyphontraining.com
SUMMARY:Anti-Cast: Oil\, Circuits\, & Cheese - An Additive Model of Failure with Jennifer Shannon
DESCRIPTION:The Swiss cheese model\, developed in 1990 by James Reason\, is based on the idea that errors can never be eliminated entirely due to complex systems but are instead “layered” like slices of swiss cheese. This model has become a well-known concept in the field of risk management that highlights how multiple layers of defense can fail\, leading to a catastrophic outcome. This model aims to provide information to decision-makers to help them reduce the chances of incidents occurring. It is crucial to keep in mind that all safety measures within an organization are linked\, and by implementing appropriate policies and standards\, risk can be minimized. So how can we apply this model to cybersecurity\, where multiple layers of security can be breached during a compromise? This talk will explore how the Swiss cheese model can be used to understand the vulnerabilities and cybersecurity risks posed to organizations. We will also examine how the layers of defense\, including people\, processes\, and technology\, can fail and lead to a breach. \n\n\n\nJennifer is a senior security consultant at Secure Ideas with a background in malware analysis\, penetration testing\, and teaching. An avid computer geek for most of her life\, she began her journey in cybersecurity as a SOC Analyst\, where she showed an aptitude for penetration testing and malware analysis. Her background as “blue team” uniquely prepared her for guiding clients through remediation and contextualizing findings for their environment. \n\n\n\nShe graduated with honors from Florida State College at Jacksonville’s networking program. While pursuing her degree\, she dedicated time to teaching computing skills to underrepresented minorities. Jennifer continues to be passionate about teaching and is eager to share her knowledge with anyone who will listen. \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nOil\, Circuits\, and CheeseDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-oil-circuits-cheese-an-additive-model-of-failure-with-jennifer-shannon/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Oil-Circuits-Cheese_-An-Additive-Model-of-Failure_Jennifer-Shannon.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20231122T120000
DTEND;TZID=America/New_York:20231122T130000
DTSTAMP:20260405T021015
CREATED:20240910T161101Z
LAST-MODIFIED:20240910T161102Z
UID:10000627-1700654400-1700658000@www.antisyphontraining.com
SUMMARY:Anti-Cast: How to Write an Adduser Shellcode with Marco Lux
DESCRIPTION:This Anti-Cast jumps right into writing a linux 32Bit shellcode\, for adding a new uid 0 user to the system passwd file. \n\n\n\nWith 20 years of experience in the field\, Marco has developed a strong interest in computer security\, hacking\, and penetration testing. \n\n\n\nThroughout his career\, he has specialized in breaking network \n\n\n\ninfrastructures and web applications. He has also gained hardware knowledge and red teaming experience. \n\n\n\nWhat sets Marco apart is his fascination with network protocol analysis and low-level computing. Throughout his journey\, Marco authored tools related to security vulnerabilities and uncovered several critical issues. \n\n\n\nAs a speaker and trainer at security events\, he shared his knowledge and insights on a variety of security subjects. \n\n\n\nOutside of cybersecurity\, Marco takes pleasure in cycling and exploring the great outdoors.  \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nHow to Write an Adduser ShellcodeDownload the slides here!\n\n\n\nShellcode – Adduser LabDownload the lab instructions here!
URL:https://www.antisyphontraining.com/event/anti-cast-how-to-write-an-adduser-shellcode-with-marco-lux/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/How-to-Write-an-Adduser-Shellcode_Marco-Lux.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20231115T120000
DTEND;TZID=America/New_York:20231115T130000
DTSTAMP:20260405T021015
CREATED:20240910T161429Z
LAST-MODIFIED:20240910T161430Z
UID:10000628-1700049600-1700053200@www.antisyphontraining.com
SUMMARY:Anti-Cast: Enterprise DFIR Investigation Scenario with Markus Schober
DESCRIPTION:Based on a compromised employee workstation scenario\, we’ll discuss how to conduct an effective DFIR investigation within enterprise environments\, following the incident response lifecycle. We’ll discuss triage and containment considerations\, as well as elaborate on best practices for performing effective data collections and forensic analysis. To wrap up\, we will discuss critical remediations and post-incident activities that should be taken into account. \n\n\n\n  \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nEnterprise DFIR Investigation Scenario with Markus SchoberDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-enterprise-dfir-investigation-scenario-with-markus-schober/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Enterprise-DFIR-Investigation-Scenario_Markus-Schober.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20231108T120000
DTEND;TZID=America/New_York:20231108T130000
DTSTAMP:20260405T021015
CREATED:20240910T161749Z
LAST-MODIFIED:20240910T161750Z
UID:10000629-1699444800-1699448400@www.antisyphontraining.com
SUMMARY:Anti-Cast: Go St*lk Yourself - Privacy Through OSINT with Mishaal Khan
DESCRIPTION:It’s always scary to Google yourself and see what you find. \n\n\n\nIn this session\, we dive into the eerie reality of personal information exposure on the internet. We’ll look at some of the resources stalkers use to get information on their victims. The combination of home address\, phone number\, email\, social media profiles\, and even family relatives can be a gold mine for stalkers. Don’t miss this opportunity to strengthen your online privacy from the lens of an OSINT expert. You’ll learn the best strategies to get your personal information out of the internet and escape the perils of stalking\, doxing\, swatting\, or account hijacking. Your digital safety is at stake – let’s be prepared! \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com
URL:https://www.antisyphontraining.com/event/anti-cast-go-stlk-yourself-privacy-through-osint-with-mishaal-khan/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Go-Stlk-Yourself_Privacy-through-OSINT_Mishaal-Khan.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20231101T120000
DTEND;TZID=America/New_York:20231101T130000
DTSTAMP:20260405T021015
CREATED:20240910T162316Z
LAST-MODIFIED:20240910T162317Z
UID:10000630-1698840000-1698843600@www.antisyphontraining.com
SUMMARY:Anti-Cast: Next Hands-On IR D&D Style Webcast with John Strand and Douglas Brush
DESCRIPTION:In our last incident response webcast\, we may have been responsible for bringing down GitHub. I have been told that it is just not possible. You can see the recording of that webcast here: https://youtube.com/live/n8aE5bwPLog Judge for yourself….  \n\n\n\nIn this next webcast\, we will have backups. You know\, just in case. For this webcast\, we will have a panel of surprise guests pretending to be characters for a D&D style IR story. But\, the catch is you will all do the hands-on work with actual evidence of an actual attack. (That we simulated in a lab.) Sorry\, not doing this with real IR data. Not today\, Satan. Not today. As always with these IR scenarios\, full logfiles and a walkthrough will be provided after the event. \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com
URL:https://www.antisyphontraining.com/event/anti-cast-next-hands-on-ir-dd-style-webcast-with-john-strand-and-douglas-brush/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Next-Hands-On-IR-DD-Style-Webcast_John-and-Douglas.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20231025T120000
DTEND;TZID=America/New_York:20231025T130000
DTSTAMP:20260405T021015
CREATED:20240910T162906Z
LAST-MODIFIED:20240910T162908Z
UID:10000631-1698235200-1698238800@www.antisyphontraining.com
SUMMARY:Anti-Cast: Horrors of Cybersecurity -  Tabletops\, Playbooks\, & Bots! with Amanda Berlin and Jeremy Mio
DESCRIPTION:This frightful webcast introduces ghoulish training exercises\, creepy incident response playbooks\, and spine-chilling after-action reports to help you prepare for a hair-raising cyberattack. \n\n\n\n\nTerror Tabletops (TTXs): Planning scary cybersecurity scenarios to test your defenses against the forces of darkness\n\n\n\nMacabre Playbooks: Developing creepy incident response plans to stop cyber monsters in their tracks\n\n\n\nHaunted Gamification: Making your exercise fun yet frightening with interactive elements to engage your team\n\n\n\nGame Bot Overview & Mini Haunting: A quick look at using chatbots to automate your horror-themed exercises\n\n\n\n\nGet ready for a thrilling webcast that will help you confront your deepest cybersecurity fears! Let’s start planning a terrifyingly effective cyber exercise for this Halloween season.  \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nHorrors of Cybersecurity – Tabletops\, Playbooks\, & Bots with Amanda and JeremyDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-horrors-of-cybersecurity-tabletops-playbooks-bots-with-amanda-berlin-and-jeremy-mio/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Horrors-of-Cybersecurity_Tabletops-Playbooks-Bots_Amanda-and-Jeremy.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20231011T120000
DTEND;TZID=America/New_York:20231011T130000
DTSTAMP:20260405T021015
CREATED:20240910T163250Z
LAST-MODIFIED:20240910T163251Z
UID:10000632-1697025600-1697029200@www.antisyphontraining.com
SUMMARY:Anti-Cast: Tales of AV/EDR Bypass - Double Feature with Greg Hatcher and John Stigerwalt
DESCRIPTION:First Showing:Delve into the realm of compiler tactics to navigate AV and EDR safeguards. Discover the potential of Cobalt Strike payloads to sidestep these security measures. Explore compilers like Clang++\, LLVM\, and G++\, showcasing their role in reshaping security strategies. \n\n\n\nBy showcasing submissions aimed at diverse vendors\, underscore the simplicity with which this shift can reintroduce invisibility to payloads. You’ll get sample code\, enabling you to explore these strategies on your own. \n\n\n\nSecond Showing:Shellcode loaders evolution has been interesting\, however\, some AV/EDR products have begun detecting the usage of direct and indirect syscalls in malware. \n\n\n\nBut what if we didn’t hard-code syscalls or even jump to a syscall region? This presentation is a deep dive into using a specific set of Windows callbacks working within their own thread pools. \n\n\n\nAttendees should expect to learn how to call Windows APIs using ROP gadgets\, basics of ROP\, and why current detection mechanisms won’t work against this attack. This is the next evolution of calling Windows APIs in malware.  \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com
URL:https://www.antisyphontraining.com/event/anti-cast-tales-of-av-edr-bypass-double-feature-with-greg-hatcher-and-john-stigerwalt/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Tales-of-AV_EDR-Bypass-Double-Feature_Greg-Hatcher-John-Stigerwalt.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20231004T120000
DTEND;TZID=America/New_York:20231004T130000
DTSTAMP:20260405T021015
CREATED:20240910T164028Z
LAST-MODIFIED:20240910T164029Z
UID:10000633-1696420800-1696424400@www.antisyphontraining.com
SUMMARY:Anti-Cast: Applying WWII-Era Analytic Techniques to CTI with Jake Williams
DESCRIPTION:Everything old is new again\, including intelligence analytic techniques. In today’s webcast\, Jake will introduce you to Kent’s Analytic Doctrine\, a formal intelligence analysis doctrine developed and refined in WWII. You don’t need to be a CTI analyst to benefit from this webcast. Practically every job in cybersecurity requires some level of analysis and understanding analytic models will make you better. We’ll even walk through some case studies from WWII showing how this timeless doctrine works for challenges both in and out of cyber. Then we’ll discuss how you can use these explicitly in cyber threat intelligence to provide better rigor in your cyber analysis. \n\n\n\n \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nApplying WWII-Era Analytic Techniques to CTIDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-applying-wwii-era-analytic-techniques-to-cti-with-jake-williams/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Applying-WWII-Era-Analytic-Techniques-to-CTI_Jake-Williams.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230927T120000
DTEND;TZID=America/New_York:20230927T130000
DTSTAMP:20260405T021015
CREATED:20240910T171909Z
LAST-MODIFIED:20240910T171910Z
UID:10000634-1695816000-1695819600@www.antisyphontraining.com
SUMMARY:Anti-Cast: Infiltrating Kubernetes - Attacker Motives and Methods with Cory Sabol
DESCRIPTION:In this one-hour webinar\, we will explore an overview of the threats targeting Kubernetes\, a crucial technology for managing containerized applications. “Infiltrating Kubernetes: An Overview of Attacker Motives and Methods\,” aims to equip IT professionals\, DevOps engineers\, and cybersecurity enthusiasts with insights into why and how attackers infiltrate Kubernetes environments.We will briefly introduce Kubernetes principles\, then move to analyze the motivations behind its attacks\, spotlighting the various attack vectors and potential vulnerabilities within Kubernetes clusters. Participants will learn about advanced threats\, including exploitation of misconfigurations\, privilege abuses\, and container escape techniques. \n\n\n\nFinally\, we will cap the session off with a live demo of an advanced container escape technique! \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nInfiltrating Kubernetes- Attacker Motives and MethodsDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-infiltrating-kubernetes-attacker-motives-and-methods-with-cory-sabol/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Infiltrating-Kubernetes_-Attacker-Motives-and-Methods_Cory-Sabol.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230920T120000
DTEND;TZID=America/New_York:20230920T130000
DTSTAMP:20260405T021015
CREATED:20240911T191610Z
LAST-MODIFIED:20240911T191611Z
UID:10000635-1695211200-1695214800@www.antisyphontraining.com
SUMMARY:Anti-Cast: API-ocalypse Now with Jennifer Shannon
DESCRIPTION:Get ready for a wild ride as Jennifer Shannon\, a Senior Security Consultant at Secure Ideas\, presents “API-ocalypse Now.” In this thrilling and entertaining webcast\, Jennifer will showcase the vulnerabilities lurking within APIs and the havoc they can wreak if left unaddressed. Through live pentesting demos\, she will demonstrate jaw-dropping exploits\, mind-bending injection attacks\, and authentication bypass techniques that will leave you on the edge of your seat. Join Jennifer as she navigates the dark side of APIs to help you understand and fortify your attack surface in order to prevent the impending API-ocalypse. \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nAPI-ocalypse Now with Jennifer ShannonDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-api-ocalypse-now-with-jennifer-shannon/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/API-ocalypse-Now_Jennifer-Shannon.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230913T120000
DTEND;TZID=America/New_York:20230913T130000
DTSTAMP:20260405T021015
CREATED:20240911T191840Z
LAST-MODIFIED:20240911T191841Z
UID:10000636-1694606400-1694610000@www.antisyphontraining.com
SUMMARY:Anti-Cast: Credential Compartmentalization in Active Directory with Eric Kuehn
DESCRIPTION:When it comes to security\, the goal is to make an attacker’s job as difficult as possible. The more hurdles they must jump through\, the easier it should be to detect and stop them. Unfortunately\, common practices around how and where privileged accounts are used in Windows environments reduces the race down to only a couple of jumps (or maybe just a sprint). We will talk about why device and account tiering is critically important for making a network a virtual obstacle course. \n\n\n\n \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nCredential Compartmentalization in Active Directory with Eric KuehnDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-credential-compartmentalization-in-active-directory-with-eric-kuehn/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Credential-Compartmentalization-in-Active-Directory_Eric-Kuehn.png
END:VEVENT
END:VCALENDAR