BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Antisyphon Training - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Antisyphon Training
X-ORIGINAL-URL:https://www.antisyphontraining.com
X-WR-CALDESC:Events for Antisyphon Training
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20220313T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20221106T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230802T120000
DTEND;TZID=America/New_York:20230802T130000
DTSTAMP:20260513T123427
CREATED:20240911T205633Z
LAST-MODIFIED:20240911T205635Z
UID:10000641-1690977600-1690981200@www.antisyphontraining.com
SUMMARY:Anti-Cast: Obtaining NETNLM Hashes by Asking Nicely with Qasim Ijaz and Jake Nelson
DESCRIPTION:Active Directory loves spewing hashes\, all kinds of them. This talk will focus on NetNTLM (or NTLM\, call it what you will) hashes. We’ll chat about how they can be obtained and used for privilege escalation and lateral movement. Here’s what we’ll cover: \n\n\n\n\nWhat NetNTLM hashes are and how they fit into AD\n\n\n\nDifferent ways to get NetNTLM hashes\n\n\n\nBroadcast and multicast-based name resolution protocols\n\n\n\nCoercion and elicitation (PetitPotam\, DFSCoerce\, shortcut files/ icons\, and even Microsoft Word)\n\n\n\nHow to crack and relay NetNTLM hashes\n\n\n\nHow to defend yourself against these types of attacks\n\n\n\n\nWe’ll break down each topic and will demonstrate some tools and techniques you can use to get and utilize NetNTLM hashes. \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nObtaining NetNTLM Hashes by Asking NicelyDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-obtaining-netnlm-hashes-by-asking-nicely-with-qasim-ijaz-and-jake-nelson/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Obtaining-NetNTLM-Hashes-by-Asking-Nicely_Qasim-Ijaz-Jake-Nelson.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230809T120000
DTEND;TZID=America/New_York:20230809T130000
DTSTAMP:20260513T123427
CREATED:20240911T204802Z
LAST-MODIFIED:20240911T204803Z
UID:10000640-1691582400-1691586000@www.antisyphontraining.com
SUMMARY:Anti-Cast: Down with the CISO with Nathan Case
DESCRIPTION:Chat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com
URL:https://www.antisyphontraining.com/event/anti-cast-down-with-the-ciso-with-nathan-case/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Down-with-the-CISO_Nathan-Case.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230816T120000
DTEND;TZID=America/New_York:20230816T130000
DTSTAMP:20260513T123427
CREATED:20240911T203333Z
LAST-MODIFIED:20240911T203335Z
UID:10000639-1692187200-1692190800@www.antisyphontraining.com
SUMMARY:Anti-Cast: XFS Forensics with xfs_db with Hal Pomeranz
DESCRIPTION:Despite being a common Linux file system\, forensic support for XFS is still largely lacking. In this session\, Hal will describe how to turn the humble xfs_db tool into a useful forensic application for examining XFS file system internals and finding critical evidence. Attackers aren’t the only ones who can “live off the land”! \n\n\n\n \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nXFS Forensics with xfs_db with Hal PomeranzDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-xfs-forensics-with-xfs_db-with-hal-pomeranz/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/XFS-Forensics-with-xfs_db_Hal-Pomeranz.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230830T120000
DTEND;TZID=America/New_York:20230830T130000
DTSTAMP:20260513T123427
CREATED:20240911T202902Z
LAST-MODIFIED:20240911T202903Z
UID:10000638-1693396800-1693400400@www.antisyphontraining.com
SUMMARY:Anti-Cast: Exploring PowerShell Logging with TellTail with Carrie Roberts
DESCRIPTION:TellTail is a free and open source application that makes it easy to view and learn about PowerShell logging. In this webcast we will enable/disable the various PowerShell logging options and watch the effect it has on what gets logged. Come to this webcast to learn more about PowerShell Script Block and Module logging and how you can easily explore and learn on your own. \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nExploring PowerShell Logging with TellTailDownload the slides here!
URL:https://www.antisyphontraining.com/event/anti-cast-exploring-powershell-logging-with-telltail-with-carrie-roberts/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/09/Exploring-PowerShell-Logging-with-TellTail_Carrie-Roberts.png
END:VEVENT
END:VCALENDAR