Antisyphon Training

728 Followers
77 Following
270 Posts
Antisyphon Training is here to disrupt the traditional training industry by providing high-quality and affordable #infosec education to everyone.
Websitehttps://www.antisyphontraining.com/
LinkedInhttps://www.linkedin.com/company/antisyphon-training/
YouTubehttps://www.youtube.com/c/AntisyphonTraining
Twitchhttps://www.twitch.tv/antisyphon
Discordhttps://discord.gg/antisyphon

Learn how threat actors weaponize stealer logs and navigate dark web markets, forums, and C2 networks.

Join us next week with our friends from Flare, where we'll Unravel Infostealer Threat Networks in our free one-hour Anti-Cast.

https://www.antisyphontraining.com/event/anti-cast-unraveling-infostealer-threat-networks-with-flare/

Ready for more Linux amazingness with @hal_pomeranz ? Then join us for this week's Anti-Cast, "XFS Forensics with xfs_db," Aug. 16 at 12 p.m. EDT! Register here: https://blackhillsinfosec.zoom.us/webinar/register/WN_fCna_N-QRSCOHNT-eqHRww
PreShow Banter™ at 11:30 a.m. EDT.

Despite being a common Linux file system, forensic support for XFS is still largely lacking. In this session, Hal will describe how to turn the humble xfs_db tool into a useful forensic application for examining XFS file system internals and finding critical evidence. Attackers aren’t the only ones who can “live off the land”!

Chat with your fellow attendees in the Antisyphon Discord server here: https://discord.gg/antisyphon -- in the #webcasts-livestreams channel

Welcome! You are invited to join a webinar: XFS Forensics with xfs_db w/ Hal Pomeranz | 1-Hour. After registering, you will receive a confirmation email about joining the webinar.

Despite being a common Linux file system, forensic support for XFS is still largely lacking. In this session, Hal will describe how to turn the humble xfs_db tool into a useful forensic application for examining XFS file system internals and finding critical evidence. Attackers aren’t the only ones who can “live off the land”! Chat with your fellow attendees in the Antisyphon Discord server here: https://discord.gg/antisyphon -- in the #webcast-livestreams channel

Zoom

Join @hal_pomeranz and the Antisyphon Team this Wednesday at 12 p.m. EDT for our next Anti-Cast, "Forensicating Linux LD_PRELOAD Rootkits"!
Tune in at 11:30 a.m. EDT for PreShow Banter™. Register here: https://zoom.us/webinar/register/WN_T43NCXR2Sg2jDmVpxUZXgw

Widespread availability of PoC Linux LD_PRELOAD rootkits means that even trivial cryptomining attacks are starting to deploy them. This talk demonstrates a simple LD_PRELOAD rootkit and techniques for detecting them in a live response scenario and by memory analysis. Get the jump on your adversaries with this fast-paced, practical introduction.

Chat with your fellow attendees in the Antisyphon Discord server here: https://discord.gg/antisyphon -- in the #webcasts-livestreams channel

Welcome! You are invited to join a webinar: Forensicating Linux LD_PRELOAD Rootkits w/ Hal Pomeranz | 1-Hour. After registering, you will receive a confirmation email about joining the webinar.

Widespread availability of PoC Linux LD_PRELOAD rootkits means that even trivial cryptomining attacks are starting to deploy them. This talk demonstrates a simple LD_PRELOAD rootkit and techniques for detecting them in a live response scenario and by memory analysis. Get the jump on your adversaries with this fast-paced, practical introduction. Chat with your fellow attendees in the Antisyphon Discord server here: https://discord.gg/antisyphon -- in the #webcast-livestreams channel

Zoom
Remember people, no matter who you are and what you do to live, thrive, and survive, everybody... everybodyyy... needs some... Blue Team in their life! Join us on Aug. 23 as we get the band back together for our Antisyphon Blue Team Summit 2023, where we'll have talks, CTF, and post-summit training on Aug. 24-25.
We'll see you there... Don't forget your shades and favorite Blues songs. 🕶️ 🎵
Event info and registration: https://www.antisyphontraining.com/training/blue-team/2023/06/blue-team-summit-coming-in-august-2023/
Blue Team Summit Coming in August 2023! – Antisyphon Training

Join us for an Anti-Cast this Wednesday with the Linux master himself, @hal_pomeranz ! Webcast starts at 12 p.m. ET, PreShow Banter™ at 11:30 a.m. ET. Register here: https://zoom.us/webinar/register/WN_1OQ0y_kMRPydr6ECFizHjg
If you’ve been using the Linux command line for a long time, you may have missed out on some sweet new features of common commands that can make your life much better. Join Sensei Hal as we break down some practical examples and demonstrate some useful new functionality.

Chat with your fellow attendees in the Antisyphon Discord server here: https://discord.gg/antisyphon -- in the #webcasts-livestreams channel

Check out Hal's class, "Linux Command Line for Analysts & Operators," that he will be teaching live, in-person at @WWHackinFest - Deadwood 2023. → https://wildwesthackinfest.com/conference/pre-conference-training/

Welcome! You are invited to join a webinar: Linux Command Line Dojo – You Can Teach an Old Dog New Tricks w/ Hal Pomeranz | 1-Hour. After registering, you will receive a confirmation email about joining the webinar.

If you’ve been using the Linux command line for a long time, you may have missed out on some sweet new features of common commands that can make your life much better. Join Sensei Hal as we break down some practical examples and demonstrate some useful new functionality. Chat with your fellow attendees in the Antisyphon Discord server here: https://discord.gg/antisyphon -- in the #webcast-livestreams channel

Zoom
Don't forget our Black Hills Information/Antisyphon Training webcast today 1 p.m. ET! Still time to register: https://zoom.us/webinar/register/WN_d-GI7v7bQriRu_O-mi7kcg#/registration
Join in at 12:30 p.m. ET for PreShow Banter™
Join @yoda June 13-16 for his class, “Introduction to Python.” Details and reg here: https://cvent.me/4brYMg?RefId=WB525_MD
Welcome! You are invited to join a webinar: Anatomy of a Python Scripted Remote Buffer Overflow w/ Joff Thyer | 1-Hour. After registering, you will receive a confirmation email about joining the webinar.

Exploit-db.com contains many different forms of software vulnerability exploits. These various software exploits are documented as anything from simple command line entities through proof of concept (POC) scripts written in languages like C, C++, C#, Ruby, Python and UNIX shell scripts.  In this webcast, Joff will break down the Python language components of an exploit documented in CVE-2019-13577, targeting the Maple Computer WBT SNMP Administrator version 2.0.195.15.  He will discuss the required Python language components, modules, and porting of the exploit from Python2 to Python3.  Chat with your fellow attendees in the Black Hills Infosec Discord server here: https://discord.gg/BHIS -- in the #webcast-live-chat channel.

Zoom

Antisyphon Training & Black Hills Information Security are collaborating on a webinar! 🎉💻

Hey folks! 👋

🔓 Exploit-db contains many different forms of software vulnerability exploits.

🔍 These various software exploits are documented as anything from simple command line entities through proof of concept (POC) scripts written in languages like C, C++, C#, Ruby, Python, and UNIX shell scripts.

🎥 In this webcast, @yoda will break down the Python language components of an exploit documented in CVE-2019-13577, targeting the Maple Computer WBT SNMP Administrator version 2.0.195.15. 🐍💥

Thursday, May 25th - 1:00 PM ET

Register: https://zoom.us/webinar/register/WN_d-GI7v7bQriRu_O-mi7kcg#/registration

He will discuss the required Python language components, modules, and porting of the exploit from Python2 to Python3.

If none of that made any sense to you, then this might be the perfect webcast to start learning these things.

Joff is also teaching another run of his "Introduction to Python" course in June! Find out more & register here: https://cvent.me/4brYMg?RefId=WB525_MD

Chat with your fellow attendees in the Antisyphon Discord server ➡️: https://discord.com/invite/antisyphon

Show up early for the pre-show!

John Strand & Joff Thyer -

Welcome! You are invited to join a webinar: Anatomy of a Python Scripted Remote Buffer Overflow w/ Joff Thyer | 1-Hour. After registering, you will receive a confirmation email about joining the webinar.

Exploit-db.com contains many different forms of software vulnerability exploits. These various software exploits are documented as anything from simple command line entities through proof of concept (POC) scripts written in languages like C, C++, C#, Ruby, Python and UNIX shell scripts.  In this webcast, Joff will break down the Python language components of an exploit documented in CVE-2019-13577, targeting the Maple Computer WBT SNMP Administrator version 2.0.195.15.  He will discuss the required Python language components, modules, and porting of the exploit from Python2 to Python3.  Chat with your fellow attendees in the Black Hills Infosec Discord server here: https://discord.gg/BHIS -- in the #webcast-live-chat channel.

Zoom
Happy Thursday, everyone! Here are next week's courses. Hope to see you there!
• "Introduction to Industrial Control Systems" | Ashley Van Hoesen | May 23-26, 2023 | Registration: https://cvent.me/m97OqD?RefId=NWC_MD

Another run of "Professionally Evil Network Testing (PENT)" with Eric Kuehn, from @secureideas, is coming up Aug. 14-18! https://cvent.me/2xP10E?RefId=IP_MD

This hands-on course will teach students a basic methodology for network penetration testing and an introduction to the processes used. Students will walk through the phases of Reconnaissance, Mapping, Discovery, Exploitation, and Post-Exploitation with demonstrations of various tools and tactics used in each phase.

Key Takeaways
• Gain a familiarity with the network penetration testing process
• Understand non-technical concepts such as client communications, scoping, documentation, and reporting
• Learn technical concepts such as mapping the network to discover vulnerabilities and how to exploit them
• Learn how to use common and applicable tools in a controlled environment

📢 Have you heard about our upcoming "Introduction to Industrial Control Systems" course with Ashley Van Hoesen?

It's running from May 23-26, and we're thrilled to announce that we're donating 10% of the class revenue to Open PLC! 🤝

Open PLC is a Programmable Logic Controller (PLC) that is based on an easy to use software. It is the first fully functional standardized open source PLC, both in software and in hardware.

We're honored to be able to support Open PLC through our upcoming course, and we hope that you'll consider joining us!

Help us support the project ➡ https://lnkd.in/eAsFNshd

Sign up for our "Introduction to Industrial Control Systems" course today. 👉 https://lnkd.in/eTBwa37Y

OpenPLC | creating Open Source Software for PLCs | Patreon

Become a patron of OpenPLC today: Get access to exclusive content and experiences on the world’s largest membership platform for artists and creators.

Patreon