Join us in-person this July for the first-ever Antisyphon Summer Camp! Register Here

Filters

Changing any of the form inputs will cause the list of events to refresh with the filtered results.

Anti-Cast: XFS Forensics with xfs_db with Hal Pomeranz

Despite being a common Linux file system, forensic support for XFS is still largely lacking. In this session, Hal will describe how to turn the humble xfs_db tool into a useful forensic application for examining XFS file system internals and finding critical evidence. Attackers aren’t ...

Anti-Cast: Exploring PowerShell Logging with TellTail with Carrie Roberts

TellTail is a free and open source application that makes it easy to view and learn about PowerShell logging. In this webcast we will enable/disable the various PowerShell logging options and watch the effect it has on what gets logged. Come to this webcast to ...

Anti-Cast: The Wrong Beer to the Barbecue – BYOVD Attacks with Alissa Torres

Based on recent threat reports, a growing number of bad actors are bringing vulnerable drivers to victim environments to exploit and guarantee a more successful attack path. These kernel drivers are legitimate, trusted and... vulnerable!  Amazingly, some have CVEs dating back to 2015 or earlier. ...

Anti-Cast: API-ocalypse Now with Jennifer Shannon

Get ready for a wild ride as Jennifer Shannon, a Senior Security Consultant at Secure Ideas, presents "API-ocalypse Now." In this thrilling and entertaining webcast, Jennifer will showcase the vulnerabilities lurking within APIs and the havoc they can wreak if left unaddressed. Through live pentesting ...

Anti-Cast: Infiltrating Kubernetes – Attacker Motives and Methods with Cory Sabol

In this one-hour webinar, we will explore an overview of the threats targeting Kubernetes, a crucial technology for managing containerized applications. “Infiltrating Kubernetes: An Overview of Attacker Motives and Methods,” aims to equip IT professionals, DevOps engineers, and cybersecurity enthusiasts with insights into why and ...

Anti-Cast: Applying WWII-Era Analytic Techniques to CTI with Jake Williams

Everything old is new again, including intelligence analytic techniques. In today's webcast, Jake will introduce you to Kent's Analytic Doctrine, a formal intelligence analysis doctrine developed and refined in WWII. You don't need to be a CTI analyst to benefit from this webcast. Practically every ...

Anti-Cast: Go St*lk Yourself – Privacy Through OSINT with Mishaal Khan

It's always scary to Google yourself and see what you find.In this session, we dive into the eerie reality of personal information exposure on the internet. We'll look at some of the resources stalkers use to get information on their victims. The combination of home ...

Anti-Cast: Enterprise DFIR Investigation Scenario with Markus Schober

Based on a compromised employee workstation scenario, we'll discuss how to conduct an effective DFIR investigation within enterprise environments, following the incident response lifecycle. We'll discuss triage and containment considerations, as well as elaborate on best practices for performing effective data collections and forensic analysis. ...

Shopping Cart

No products in the cart.