In this video, John and Rob discuss various network monitoring and security tools, highlighting their functionalities and applications in cybersecurity. They demonstrate the use of tools like Rita and LogRhythm’s Network Monitor, explaining how these tools can be used for traffic analysis, threat detection, and incident response.
In this video, John Strand discusses the concept of beaconing using the tool Rita from the Active Defense Harbinger Distribution (ADHD). He explains how to use Rita to analyze packet captures for beaconing patterns, leveraging its capabilities to parse and analyze network data.
/// 🔗 Register for webcasts, summits, and workshops – https://blackhillsinfosec.zoom.us/ze/hub/stadium 🛝 Webcast Slides – https://www.antisyphontraining.com/wp-content/uploads/2024/06/2024_06_05_anticast_How-to-Forge-Fake-News-and-Spawn-Flawless-Phisheries_Michael-Allen.pdf Anyone (and we mean anyone) can create perfect forgeries of trusted websites and use them to spread misinformation, conduct phishing attacks, or worse. In this webcast we explore the topic …
/// 🔗 Register for webcasts, summits, and workshops – https://blackhillsinfosec.zoom.us/ze/hub/stadium 🛝 Webcast Slides – https://www.antisyphontraining.com/wp-content/uploads/2024/05/2024_05_29_anticast_Realistic-End-to-End-Attacks-Detective-Controls_Jeff-McJunkin.pdf Jeff reveals the five ways outside attackers gain internal access and outlines three core defender objectives: Reducing initial access.Lowering detection and response time.Slowing down the attackers. Discover actionable insights through …
/// 🔗 Register for webcasts, summits, and workshops – https://blackhillsinfosec.zoom.us/ze/hub/stadium 🛝 Webcast Slides – https://www.antisyphontraining.com/wp-content/uploads/2024/05/2024_05_22_anticast_Offensive-Wireless-for-Red-Teams_Alex-Sanders.pdf In this expanded rendition of the Alex’s Offensive Summit talk ‘Wireless for Red Teams,’ he will broaden your understanding of wireless technologies and how to leverage them in red team …
/// 🔗 Register for webcasts, summits, and workshops – https://blackhillsinfosec.zoom.us/ze/hub/stadium 🛝 Webcast Slides – https://www.antisyphontraining.com/wp-content/uploads/2024/05/2024_05_15_anticast_Threat-Models-Landscape-and-Profiles-OH-MY_Wade-Wells.pdf This free one-hour Antisyphon Anti-cast with instructor Wade Wells offers an insightful overview of cyber threat landscaping, threat modeling, and threat profiling. Wade aims to equip attendees with the knowledge …
/// 🔗 Register for webcasts, summits, and workshops – https://poweredbybhis.com 🛝 Webcast Slides – https://www.antisyphontraining.com/wp-content/uploads/2024/05/2024_05_08_anticast_60min-Crash-Course-into-Infosec_Bill-McCauley.pdf 60min Crash Course into Infosec w/ Bill McCauley Join us for a one-hour Antisyphon Anti-cast with instructor Bill McCauley from Secure Ideas, as he dives into a high-level webapp pentest …
/// 🔗 Register for webcasts, summits, and workshops – https://poweredbybhis.com 🛝 Webcast Slides – https://www.antisyphontraining.com/wp-content/uploads/2024/05/2024_05_01_anticast_Security-Split-Divorcing-Your-Stack_Alissa-Torres.pdf So your security team is convinced it needs to graduate to the newest “best” enterprise security tool, I get it. But for most, this type of architecture shift requires careful …
/// 🔗 Register for webcasts, summits, and workshops – https://blackhillsinfosec.zoom.us/ze/hub/stadium 🛝 Webcast Slides – https://www.antisyphontraining.com/wp-content/uploads/2024/04/2024_04_24_anticast_Learning-from-Macedonia_How-InfoSec-Fails-Spawn-from-Sales-Marketing.pdf Learning from Macedonia: How InfoSec Fails Spawn from Sales & Marketing Join us for a free one-hour Antisyphon Anti-cast, with Kevin Johnson. Learn how exaggeration undermines trust and efficiency. Using …