Join us at the Blue Team Summit! Register Here

Filters

Changing any of the form inputs will cause the list of events to refresh with the filtered results.

Anti-Cast: Applying WWII-Era Analytic Techniques to CTI with Jake Williams

Everything old is new again, including intelligence analytic techniques. In today's webcast, Jake will introduce you to Kent's Analytic Doctrine, a formal intelligence analysis doctrine developed and refined in WWII. You don't need to be a CTI analyst to benefit from this webcast. Practically every ...

Anti-Cast: Go St*lk Yourself – Privacy Through OSINT with Mishaal Khan

It's always scary to Google yourself and see what you find. In this session, we dive into the eerie reality of personal information exposure on the internet. We'll look at some of the resources stalkers use to get information on their victims. The combination of ...

Anti-Cast: Enterprise DFIR Investigation Scenario with Markus Schober

Based on a compromised employee workstation scenario, we'll discuss how to conduct an effective DFIR investigation within enterprise environments, following the incident response lifecycle. We'll discuss triage and containment considerations, as well as elaborate on best practices for performing effective data collections and forensic analysis. ...

Anti-Cast: How to Write an Adduser Shellcode with Marco Lux

This Anti-Cast jumps right into writing a linux 32Bit shellcode, for adding a new uid 0 user to the system passwd file. With 20 years of experience in the field, Marco has developed a strong interest in computer security, hacking, and penetration testing. Throughout his ...

Anti-Cast: Triad of Success – Education, Experience, and Networking with Wade Wells

In the ever-evolving landscape of professional development, the triad of education, experience, and networking emerges as a foundational pillar for career growth and success. This free one-hour Antisyphon Anti-Cast delves into the intricate interplay of these three crucial elements, exploring how they individually and collectively ...

Anti-Cast: New Year, New Skills: Web App Pentesting with Jennifer Shannon

In a world where web applications are the new battleground. Hackers are constantly looking for ways to exploit them and steal your secrets, sabotage your network, or harm your customers. But you are not alone... Jennifer Shannon is here to help you fight back. In ...

Anti-Cast: WMI Abuse: How Threat Actors Use WMI with Gerard Johansen

In this free one-hour Antisyphon Anti-Cast, Gerard Johansen, Principal Readiness Engineer for Red Canary and Antisyphon instructor, will run through how threat actors use the Windows Management Instrumentation (WMI) for Lateral Movement and Persistence. Gerard will walk through how threat actors use WMI, what trace ...

Shopping Cart

No products in the cart.