Browsing the "red team" Tag

What is Red Teaming Explained In Hindi

March 11th, 2020 📆 | 6895 Views ⚑

Best Ethical [email protected] Course for Beginners? Create Your Own Tools Using Python Course in Hindi Hello Guys In

Tagged with:

Hacking Cloud – 1(AWS) A(manual cloudgoat scenarios)

March 2nd, 2020 📆 | 2657 Views ⚑

Hacking(Pen-testing) AWS deployments manually using awscli. AWS services in-scope are IAM, EC2, RDS, LAMBDA, Modified host header, Loadbalancer, codebuild, SSM

Tagged with:

Trends in red team certs | Cyber Career Forum – Jason Dion

January 23rd, 2020 📆 | 3855 Views ⚑

Infosec Community » Cyber Career Forum is a series where members of the cybersecurity community answer common questions from

Tagged with:

Chris McCoy – Through the Looking Glass Own the Data Center – DEF CON 27 Red Team Offensive Village

December 13th, 2019 📆 | 7722 Views ⚑

The data center embodies the heart of many businesses on the Internet. It contains much of the information in a

Tagged with:

Casey Erdmann – BadSalt Adversarial DevOps – DEF CON 27 Red Team Offensive Village

December 13th, 2019 📆 | 5398 Views ⚑

SaltStack is robust configuration management utility used by many to achieve DevOps related initiatives in their organizations. Thanks to its

Tagged with:

My Path to OSCP: Year 1 – I'm on a Red Team

August 19th, 2019 📆 | 4407 Views ⚑

It’s been an ENTIRE year since my very first OSCP video! I haven’t achieved the OSCP certification YET, but I

Tagged with:

Weaponizing Active Directory

August 1st, 2019 📆 | 3976 Views ⚑

Download slides: 0:54 Background behind this webcast, what and why 7:02 Creating resources in Active Directory, User accounts, Groups,

Tagged with:

O QUE É UMA BOTNET? – DDOS em massa!

April 22nd, 2019 📆 | 5680 Views ⚑

CURSO: – Olá, seja bem vindo ao Guia Anônima, canal focado em segurança da informação e Hacking. Neste vídeo

Tagged with:

Red Teaming for Security Operations

April 17th, 2019 📆 | 3739 Views ⚑

A Red Team for Security Operations, also know as a “Purple Team”, tests a security staff’s ability to safeguard its

Tagged with:

POP AX Cybersecurity Conference 2018: Taz Wake

March 21st, 2019 📆 | 7889 Views ⚑

Taz Wake, Managing Director of Halkyn Consulting LTD – delivering a fascinating presentation on some of the Cyber-threat hunting sessions

Tagged with:

Endpoint Security Got You Down? No PowerShell? No Problem.

February 25th, 2019 📆 | 2613 Views ⚑

Download slides: 00:53 Introduction, what is a .NET assembly, and .NET languages 6:13 Assembly, Load, and Embedding Interpreters/Engines 14:16

Tagged with:

Could a Red Team Breach Your Organization?

February 1st, 2019 📆 | 5381 Views ⚑

Curtis Brazzell, managing security consultant at cybersecurity firm Pondurance, discusses common Red Team methods his team uses to attack organizations

Tagged with:

Quantify Your Hunt: Not Your Parents’ Red Team – SANS Threat Hunting Summit 2018

January 16th, 2019 📆 | 8283 Views ⚑

The security marketplace is saturated with product claims of detection coverage that have been almost impossible to evaluate, all while

Tagged with: