In this video, John Strand discusses the concept and strategies around Cyber deception. They explore the use of deception technology in cybersecurity, clarifying that it does not involve illegal activities such as hacking back but is aimed at increasing the effort required for an attacker to succeed.
In this video, Hal and John discuss advanced Unix command line techniques and their implications for system administration and security. They delve into various Unix commands, demonstrating their use in real-world scenarios to manipulate and analyze system data effectively.
In this video, Velda, John, Jason, and Deb discuss the challenges and insights of transitioning a physical conference to a virtual format due to unforeseen circumstances. They cover the technical setup, including the use of platforms like GoToWebinar and Discord, and the logistical adjustments needed to accommodate speakers and attendees remotely.
In this video, the speakers discuss the implementation and benefits of using AppLocker and Sysmon for enhancing security in IT environments. They demonstrate how to set up and configure both tools, and explain how they can prevent unauthorized applications from running and provide detailed logging of system activity.
In this video, the speakers discuss various free tools and techniques for hunt teaming within organizations, focusing primarily on network-based approaches. They delve into the challenges of detecting command and control channels, especially when data is encrypted or obfuscated, and explore the use of artificial intelligence to enhance detection capabilities.
In this video, John and Alyssa discuss advanced memory analysis techniques. They delve into the use of tools like Volatility and Rekall for dissecting memory dumps, and demonstrate how to extract critical data from a Windows operating system.
In this video, seasoned experts discuss effective strategies for starting and advancing a career in computer security. They emphasize the importance of understanding core principles over chasing buzzwords like ‘blockchain’ and ‘AI’ initially.
In this video, the speakers discuss hardware hacking, focusing on techniques for identifying and exploiting vulnerabilities in various devices such as routers and access points. They demonstrate practical methods using tools like the Jtagulator and bus pirate to interface with device firmware, illustrating the potential to extract sensitive information or manipulate device functionalities.
In this video, John Strand discusses the practical applications and features of Wireshark for network analysis. He demonstrates how to use Wireshark to capture and analyze packets, emphasizing its advantages over tcpdump.
In this video, BB King discusses advanced techniques for leveraging Python in open-source intelligence (OSINT) gathering. He demonstrates how to extract and analyze data, providing insights into handling and parsing responses from various APIs and web services.