Completed
Proxy and DNS logs
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Red Team Madness - Or How I Learned To Stop Worrying and Expect Pentester Mistakes
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 What prompted this presentation
- 3 Sun Encrypted Drive
- 4 Proxy and DNS logs
- 5 Callouts
- 6 Kali Linux
- 7 Metasploit
- 8 Burp Suite
- 9 Nikto
- 10 MeltyGo
- 11 Korra
- 12 DHCP logs
- 13 Look at all DHCP addresses
- 14 Make it simple for yourself
- 15 Use sysinternals tool
- 16 Detect pass the hash
- 17 Get Windows security logs
- 18 Windows admins dont understand how this works
- 19 Microsofts Guide
- 20 NSA Guide
- 21 Event Log Monitoring
- 22 Event Log Detection
- 23 Brute Force Attacks
- 24 Username Guessing
- 25 False Positives
- 26 Port Scans
- 27 Pentest
- 28 Pen Test Story
- 29 The Gig Was Up
- 30 The Good Way To Respond
- 31 The Bad Way To Respond
- 32 Did I Work With Thee
- 33 The Bigger Takeaway