Completed
The circle despair
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Advanced Incident Remediation Techniques
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Bad hosts
- 3 The UFP
- 4 Problem with the UFP
- 5 The circle despair
- 6 Why is wiping the box
- 7 What is happening
- 8 Who is the attacker
- 9 Active attacker
- 10 What we typically get
- 11 Typical timeline
- 12 EM Trends
- 13 What can you do
- 14 Missed opportunities
- 15 Look after your Intel
- 16 Protect your information
- 17 Telegraph your activities
- 18 ENOS
- 19 Day slots
- 20 Deploying agents
- 21 Pentest vs Redteam
- 22 They know how to
- 23 How we can detect them
- 24 OPSEC fails
- 25 Sector synchronized isolation
- 26 Scenario
- 27 How long does it take
- 28 Theyre the after bad guy
- 29 Weve got some great people
- 30 WhackaMole
- 31 Mass simultaneous system remediation
- 32 Full visibility
- 33 Balls of steel
- 34 Rebuild
- 35 Sector synchronized
- 36 Hostile asset recovery
- 37 Play a game
- 38 Burn Intel
- 39 DEFCON Group