Sign Up for our Free One-Day SOC Summit Event March 25, 2026 Register Here

Blog Posts

Advanced Network Threat Hunting is coming to BSides Charm 2023!

…network with other professionals in the field and expand your knowledge even further. πŸ’» Don’t wait – register now to secure your spot and join us for this incredible event! πŸš€ We can’t wait to see you there! πŸ•΅οΈ‍♀️ Register ➑ https://www.antisyphontraining.com/bsides-charm-2023/ Related Courses Jake Williams Live Hands-On AI Security…

🚨Don’t miss out on Network Forensics & Incident Response at Bsides Charm!

…gain valuable knowledge that you can apply in your work immediately. πŸ’» Join us in Towson, Maryland on April 27-28 for this incredible event, and take your cybersecurity career to new heights! πŸ”’ Register now to secure your spot. Register ➑ https://www.antisyphontraining.com/bsides-charm-2023/ Featured Courses No courses found in this query…

Sharpen your skills with Professionally Evil Container Security!

…range, where you can practice your newfound knowledge in a real-world, hands-on environment! Course Highlights: Core containerization fundamentals Discover and exploit common Docker and Kubernetes security flaws 6-month access pass to the Antisyphon Cyber range, and 6-month access to class recordings is available for only $295. Register now and secure

How to Build a Home Lab for Infosec

How to Build a Home Lab for Infosec (with Ralph May)

…actually learning how it works, especially in security. I have a huge belief in that you should know how it just works before you think about how to secure it. A lot of times misconfigurations are the number one vulnerability, so think about it. All right, so we also maybe…

Genymotion – Proxying Android App Traffic Through Burp Suite

Genymotion: Proxying App Traffic Through Burp Suite

…settings. The tutorial includes exporting and installing certificates on the emulator to enable secure traffic analysis. Setting up a proxy in Burp for Android traffic inspection requires installing and configuring both the emulator and the proxy settings appropriately. Installation of the Burp certificate on the Android device is critical for…

AASLR: Red Team Infrastructure Primer

…So real cool. Yeah, real cool with the docker stuff. everything’s going to look up out of the op drive, so. And everything’s out of cobalt strike. So we do the Cs profile. This comes from the f secure land, so they’ll understand exactly what we’re doing here. So just…

Threat Hunting with Velociraptor

…and all those things just because the default is clearly not enough here. So that’s kind of our thought process in that. but for the sake of simplicity, and this is a lab environment, it is deployed in a very insecure way. So do not do this at home when…

Tales of AV/EDR Bypass

…help secure clients. And if I can bypass AVdr within five minutes, that means your security stack needs improvement. So. And I stick by that. I’ll stand by that all day long. So the thing I was tell clients, if I can bypass it in five minutes, that means the…

Kerberos & Attacks 101

…Windows authentication, involving a client, service, and an intermediary trusted by both, which ensures secure transactions without mutual trust between the client and server. The webinar detailed the process of Kerberos authentication and ticket granting, including how attackers can exploit Kerberos tickets to gain unauthorized access to systems. Highlights Full…

A blue team's perspective on red team hack tools.

A Blue Team’s Perspective on Red Team Hack Tools

…go. Jordan Drysdale All right, man, you’re up. swing. Kent Ickler So we wanted to have a talk today. A while back. We had a conversation with the client and there was something along the lines of can you help us secure our active directory to put, environment? And we…

Shopping Cart

No products in the cart.