BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Antisyphon Training - ECPv6.15.17.1//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://www.antisyphontraining.com
X-WR-CALDESC:Events for Antisyphon Training
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240807T120000
DTEND;TZID=America/New_York:20240807T130000
DTSTAMP:20260405T061151
CREATED:20240828T174654Z
LAST-MODIFIED:20240903T210753Z
UID:10000590-1723032000-1723035600@www.antisyphontraining.com
SUMMARY:Anti-Cast: New Methods to Attack and Defend Active Directory with Eric Kuehn
DESCRIPTION:With the recent enhancements Microsoft has made to Active Directory security\, staying hidden during a penetration test has gotten harder.    \n\n\n\nNot only will some of the tried-and-true attacks fail outright\, but those that succeed may leave signs that alert defenders.    \n\n\n\nJoin us for a free one-hour Antisyphon Anti-cast\, with instructor Eric Kuehn\, as he dives into the nitty-gritty of these changes and demonstrate how they can impact tests.    \n\n\n\nFor the penetration tester\, it’s a chance to see how we should refine our attacks; for the defender\, it’s the opportunity to see what new events could be signs of a breach.  \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com
URL:https://www.antisyphontraining.com/event/anti-cast-new-methods-to-attack-and-defend-active-directory-with-eric-kuehn/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/08/image.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240821T120000
DTEND;TZID=America/New_York:20240821T130000
DTSTAMP:20260405T061151
CREATED:20240828T172929Z
LAST-MODIFIED:20240903T210816Z
UID:10000589-1724241600-1724245200@www.antisyphontraining.com
SUMMARY:Anti-Cast: W.T.F. Is a Kubernete and How Do I Attack It? with Graham Helton
DESCRIPTION:We’ve all heard of Kubernetes\, but for most of us it’s a topic we’ve ignored by saying “I’ll figure out it is one day”.   \n\n\n\nUnfortunately for our freetime\, Kubernetes is actually worth learning in both an offensive and defensive security context as it’s quickly taking over as the primary way organizations deploy applications.  \n\n\n\nJoin us for a free one-hour Antisyphon Anti-Cast\, with Graham Helton\, as he embarks on a Kubernetes crash course.   \n\n\n\nAttendees will gain a high level understanding of what Kubernetes is (without any pre-existing Kubernetes knowledge) and learn how to effectively hack into a real Kubernetes cluster (uh… with permission of course).  \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com
URL:https://www.antisyphontraining.com/event/anti-cast-w-t-f-is-a-kubernete-and-how-do-i-attack-it-with-graham-helton/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/png:https://www.antisyphontraining.com/wp-content/uploads/2024/08/Wtf-Is-a-Kubernete-and-How-Do-I-Attack-It-w-Graham-Helton1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240822T090000
DTEND;TZID=America/New_York:20240823T180000
DTSTAMP:20260405T061151
CREATED:20240801T212452Z
LAST-MODIFIED:20241031T180308Z
UID:10000579-1724317200-1724436000@www.antisyphontraining.com
SUMMARY:Advanced Offensive Tooling with Chris Traynor
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/advanced-offensive-tooling-with-chris-traynor/
LOCATION:Online
CATEGORIES:Red Team
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240828T120000
DTEND;TZID=America/New_York:20240828T130000
DTSTAMP:20260405T061151
CREATED:20240827T201738Z
LAST-MODIFIED:20240827T212639Z
UID:10000587-1724846400-1724850000@www.antisyphontraining.com
SUMMARY:Anti-Cast: Fearless Forensic Shell FU with Hal Pomeranz
DESCRIPTION:Expensive forensic tools making you blue? \n\n\n\nJoin us for a free one-hour Antisyphon Anti-cast with Linux Instructor\, Hal Pomeranz\, and get back to basics with wacky Linux shell recipes for parsing forensic artifacts. \n\n\n\n“dd”\, “xxd”\, arithmetic problems\, loops and more! \n\n\n\nChat with your fellow attendees in the Antisyphon Discord server:https://discord.gg/antisyphonin the #🍿anticasts-chat channel \n\n\n\n\nRegister Here
URL:https://www.antisyphontraining.com/event/fearless-forensic-shell-fu-with-hal-pomeranz/
ATTACH;FMTTYPE=image/jpeg:https://www.antisyphontraining.com/wp-content/uploads/2024/08/Fearless-Forensic-Shell-Fu-w-Hal-Pomeranz-PROMO-v2.jpg
END:VEVENT
END:VCALENDAR