Learn how threat actors weaponize stealer logs and navigate dark web markets, forums, and C2 networks.
Join us next week with our friends from Flare, where we'll Unravel Infostealer Threat Networks in our free one-hour Anti-Cast.
Learn how threat actors weaponize stealer logs and navigate dark web markets, forums, and C2 networks.
Join us next week with our friends from Flare, where we'll Unravel Infostealer Threat Networks in our free one-hour Anti-Cast.
Ready for more Linux amazingness with @hal_pomeranz ? Then join us for this week's Anti-Cast, "XFS Forensics with xfs_db," Aug. 16 at 12 p.m. EDT! Register here: https://blackhillsinfosec.zoom.us/webinar/register/WN_fCna_N-QRSCOHNT-eqHRww
PreShow Banter™ at 11:30 a.m. EDT.
Despite being a common Linux file system, forensic support for XFS is still largely lacking. In this session, Hal will describe how to turn the humble xfs_db tool into a useful forensic application for examining XFS file system internals and finding critical evidence. Attackers aren’t the only ones who can “live off the land”!
Chat with your fellow attendees in the Antisyphon Discord server here: https://discord.gg/antisyphon -- in the #webcasts-livestreams channel
Despite being a common Linux file system, forensic support for XFS is still largely lacking. In this session, Hal will describe how to turn the humble xfs_db tool into a useful forensic application for examining XFS file system internals and finding critical evidence. Attackers aren’t the only ones who can “live off the land”! Chat with your fellow attendees in the Antisyphon Discord server here: https://discord.gg/antisyphon -- in the #webcast-livestreams channel
Join @hal_pomeranz and the Antisyphon Team this Wednesday at 12 p.m. EDT for our next Anti-Cast, "Forensicating Linux LD_PRELOAD Rootkits"!
Tune in at 11:30 a.m. EDT for PreShow Banter™. Register here: https://zoom.us/webinar/register/WN_T43NCXR2Sg2jDmVpxUZXgw
Widespread availability of PoC Linux LD_PRELOAD rootkits means that even trivial cryptomining attacks are starting to deploy them. This talk demonstrates a simple LD_PRELOAD rootkit and techniques for detecting them in a live response scenario and by memory analysis. Get the jump on your adversaries with this fast-paced, practical introduction.
Chat with your fellow attendees in the Antisyphon Discord server here: https://discord.gg/antisyphon -- in the #webcasts-livestreams channel
Widespread availability of PoC Linux LD_PRELOAD rootkits means that even trivial cryptomining attacks are starting to deploy them. This talk demonstrates a simple LD_PRELOAD rootkit and techniques for detecting them in a live response scenario and by memory analysis. Get the jump on your adversaries with this fast-paced, practical introduction. Chat with your fellow attendees in the Antisyphon Discord server here: https://discord.gg/antisyphon -- in the #webcast-livestreams channel
Join us for an Anti-Cast this Wednesday with the Linux master himself, @hal_pomeranz ! Webcast starts at 12 p.m. ET, PreShow Banter™ at 11:30 a.m. ET. Register here: https://zoom.us/webinar/register/WN_1OQ0y_kMRPydr6ECFizHjg
If you’ve been using the Linux command line for a long time, you may have missed out on some sweet new features of common commands that can make your life much better. Join Sensei Hal as we break down some practical examples and demonstrate some useful new functionality.
Chat with your fellow attendees in the Antisyphon Discord server here: https://discord.gg/antisyphon -- in the #webcasts-livestreams channel
Check out Hal's class, "Linux Command Line for Analysts & Operators," that he will be teaching live, in-person at @WWHackinFest - Deadwood 2023. → https://wildwesthackinfest.com/conference/pre-conference-training/
If you’ve been using the Linux command line for a long time, you may have missed out on some sweet new features of common commands that can make your life much better. Join Sensei Hal as we break down some practical examples and demonstrate some useful new functionality. Chat with your fellow attendees in the Antisyphon Discord server here: https://discord.gg/antisyphon -- in the #webcast-livestreams channel
Exploit-db.com contains many different forms of software vulnerability exploits. These various software exploits are documented as anything from simple command line entities through proof of concept (POC) scripts written in languages like C, C++, C#, Ruby, Python and UNIX shell scripts. In this webcast, Joff will break down the Python language components of an exploit documented in CVE-2019-13577, targeting the Maple Computer WBT SNMP Administrator version 2.0.195.15. He will discuss the required Python language components, modules, and porting of the exploit from Python2 to Python3. Chat with your fellow attendees in the Black Hills Infosec Discord server here: https://discord.gg/BHIS -- in the #webcast-live-chat channel.
Antisyphon Training & Black Hills Information Security are collaborating on a webinar! 🎉💻
Hey folks! 👋
🔓 Exploit-db contains many different forms of software vulnerability exploits.
🔍 These various software exploits are documented as anything from simple command line entities through proof of concept (POC) scripts written in languages like C, C++, C#, Ruby, Python, and UNIX shell scripts.
🎥 In this webcast, @yoda will break down the Python language components of an exploit documented in CVE-2019-13577, targeting the Maple Computer WBT SNMP Administrator version 2.0.195.15. 🐍💥
Thursday, May 25th - 1:00 PM ET
Register: https://zoom.us/webinar/register/WN_d-GI7v7bQriRu_O-mi7kcg#/registration
He will discuss the required Python language components, modules, and porting of the exploit from Python2 to Python3.
If none of that made any sense to you, then this might be the perfect webcast to start learning these things.
Joff is also teaching another run of his "Introduction to Python" course in June! Find out more & register here: https://cvent.me/4brYMg?RefId=WB525_MD
Chat with your fellow attendees in the Antisyphon Discord server ➡️: https://discord.com/invite/antisyphon
Show up early for the pre-show!
John Strand & Joff Thyer -
Exploit-db.com contains many different forms of software vulnerability exploits. These various software exploits are documented as anything from simple command line entities through proof of concept (POC) scripts written in languages like C, C++, C#, Ruby, Python and UNIX shell scripts. In this webcast, Joff will break down the Python language components of an exploit documented in CVE-2019-13577, targeting the Maple Computer WBT SNMP Administrator version 2.0.195.15. He will discuss the required Python language components, modules, and porting of the exploit from Python2 to Python3. Chat with your fellow attendees in the Black Hills Infosec Discord server here: https://discord.gg/BHIS -- in the #webcast-live-chat channel.
Another run of "Professionally Evil Network Testing (PENT)" with Eric Kuehn, from @secureideas, is coming up Aug. 14-18! https://cvent.me/2xP10E?RefId=IP_MD
This hands-on course will teach students a basic methodology for network penetration testing and an introduction to the processes used. Students will walk through the phases of Reconnaissance, Mapping, Discovery, Exploitation, and Post-Exploitation with demonstrations of various tools and tactics used in each phase.
Key Takeaways
• Gain a familiarity with the network penetration testing process
• Understand non-technical concepts such as client communications, scoping, documentation, and reporting
• Learn technical concepts such as mapping the network to discover vulnerabilities and how to exploit them
• Learn how to use common and applicable tools in a controlled environment
📢 Have you heard about our upcoming "Introduction to Industrial Control Systems" course with Ashley Van Hoesen?
It's running from May 23-26, and we're thrilled to announce that we're donating 10% of the class revenue to Open PLC! 🤝
Open PLC is a Programmable Logic Controller (PLC) that is based on an easy to use software. It is the first fully functional standardized open source PLC, both in software and in hardware.
We're honored to be able to support Open PLC through our upcoming course, and we hope that you'll consider joining us!
Help us support the project ➡ https://lnkd.in/eAsFNshd
Sign up for our "Introduction to Industrial Control Systems" course today. 👉 https://lnkd.in/eTBwa37Y