The Most Offensive Con That Ever Offensived Summit
https://zoom.us/j/95879143124
https://zoom.us/j/95879143124
Register: https://www.antisyphontraining.com/active-defense-cyber-deception-w-john-strand/ Active Defenses have been capturing a large amount of attention in the media lately. There are those who thirst for vengeance and want to directly attack the attackers. There are those who believe that any sort of active response directed at an attacker is wrong. We believe the answer is somewhere in between. […]
AASLR will have infosec professionals sharing their knowledge on tools, techniques, and procedures and then answering a lot of your questions on everything you can think to ask. Streamed live every Tuesday and Wednesday @ 4:30 pm. https://www.twitch.tv/antisyphon
To conduct an advanced attack, you need more than just a collection of simple scripts. In addition to talent, you need a large amount of managed and unmanaged code. The more code and resources that are required to conduct an engagement, the more time we need. Time is something we don’t have a lot of […]
Register: https://www.antisyphontraining.com/linux-command-line-dojo-w-hal-pomeranz/ The DevOps folks are pushing Linux, your red-team friends are doing serious damage with Linux-based tools, and the Linux users on your Incident Response team are doing mysteriously powerful things. You’re ready to see if some of the Linux magic can rub off on you, but you don’t know where to start. This […]
Register: https://www.antisyphontraining.com/how-to-be-irresistible-to-hiring-managers/ Are you spending hours a day trawling through the online job sites and spending even more time filling out lengthy application forms with nothing to show for it? Something’s not working, but what could it be? Kip Boyle, a veteran hiring manager who has personally interviewed hundreds of job applicants as well as […]
Register: https://www.antisyphontraining.com/advanced-network-threat-hunting-w-chris-brenton/ So far we’ve had over 21,000 students attend our one-day network threat hunting course. Many have asked that we provide an extended class with more hands-on lab time. That is exactly what we have rolled into this 16-hour course! We will spend most of this class analyzing pcap files for Command and Control (C2) communications […]
Register: https://www.antisyphontraining.com/breaching-the-cloud-w-beau-bullock/ Do you want to level up your cloud penetration testing skills? The attack surface of many organizations has changed to include third-party hosted services such as Amazon Web Services, Microsoft Azure, and Google Cloud Platform. In this training course, hacking concepts will be introduced for each of those services. This training walks through […]
Register: https://www.antisyphontraining.com/enterprise-attack-initial-access-w-steve-borosh/ Enterprises have been working tirelessly to improve their security postures through defense-in-depth approaches. Offensive teams have also been putting in long hours of research into bypassing the latest EDR’s and defensive products that keep them on their toes. Long gone “hopefully” are the days of hurdling an HTA file laced with a download […]
Register: https://www.antisyphontraining.com/offensive-development-w-greg-hatcher-john-stigerwalt/ Dive deep into cutting edge techniques that bypass or neuter modern endpoint defenses. Learn how these solutions work to mitigate their utility and hide deep within code on the endpoint. The days of downloading that binary from the internet and pointing it at a remote machine are over. Today’s defenses oftentimes call for […]
Register: https://www.antisyphontraining.com/modern-webapp-pentesting-w-bb-king/ Modern Webapp Pentesting is unique in its approach to testing webapps. Too many courses are built around the assumption that a webapp pentester’s skills should grow along a straight line, starting with something like the OWASP Top Ten and culminating in something like Attacking Web Cryptography. Real webapps don’t follow that same path, and […]
Register: https://www.antisyphontraining.com/network-forensics-and-detection-w-troy-wojewoda/ Incident responders are continually faced with the challenge of collecting and analyzing relevant event data—network communications is no exception. This course uses an assortment of network data acquisition tools and techniques with a focus on open-source, vendor-neutral solutions. Students who take this course will learn how to perform network traffic and protocol analysis […]