Join us in-person this July for the first-ever Antisyphon Summer Camp! Register Here

Social Posts

Blog Posts

Genymotion – Proxying Android App Traffic Through Burp Suite

Genymotion: Proxying App Traffic Through Burp Suite

…settings. The tutorial includes exporting and installing certificates on the emulator to enable secure traffic analysis. Setting up a proxy in Burp for Android traffic inspection requires installing and configuring both the emulator and the proxy settings appropriately. Installation of the Burp certificate on the Android device is critical for…

AASLR: Red Team Infrastructure Primer

…So real cool. Yeah, real cool with the docker stuff. everything’s going to look up out of the op drive, so. And everything’s out of cobalt strike. So we do the Cs profile. This comes from the f secure land, so they’ll understand exactly what we’re doing here. So just…

Threat Hunting with Velociraptor

…and all those things just because the default is clearly not enough here. So that’s kind of our thought process in that. but for the sake of simplicity, and this is a lab environment, it is deployed in a very insecure way. So do not do this at home when…

Tales of AV/EDR Bypass

…help secure clients. And if I can bypass AVdr within five minutes, that means your security stack needs improvement. So. And I stick by that. I’ll stand by that all day long. So the thing I was tell clients, if I can bypass it in five minutes, that means the…

Kerberos & Attacks 101

…Windows authentication, involving a client, service, and an intermediary trusted by both, which ensures secure transactions without mutual trust between the client and server. The webinar detailed the process of Kerberos authentication and ticket granting, including how attackers can exploit Kerberos tickets to gain unauthorized access to systems. Highlights Full…

A blue team's perspective on red team hack tools.

A Blue Team’s Perspective on Red Team Hack Tools

…go. Jordan Drysdale All right, man, you’re up. swing. Kent Ickler So we wanted to have a talk today. A while back. We had a conversation with the client and there was something along the lines of can you help us secure our active directory to put, environment? And we…

What’s in the Box?? | I.R. Summit 2024

…Quick intro about me. founded secure point solutions, about five years ago. We have customers as small as one user, that is getting 24/7 services all the way up to, 100, whatever. I’ve been working with managed service providers and small businesses for a while. prior to that I worked…

Designing AD Job Functional Security: One Group for Least Privilege

…someone misconfigures something because they didn’t know who the fictional user account was. They said, what is this fictional domain Admin? Clearly I must delete it because this isn’t secure. Right. The point here is that your naming conventions reduce accidental privileges in the environment. They reduce accidental mistakes that…

Shopping Cart

No products in the cart.