Completed
Threat Model: Hacktivism
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Planning and Executing a Red Team Engagement
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Talk Outline
- 3 Wargames
- 4 Wargame Examples - CTF
- 5 Engagement Definition
- 6 Terminology Review
- 7 Red Teaming - Defined
- 8 What is a Red Team Exercise?
- 9 Security Maturity Models
- 10 Red Team - 3 Target Areas
- 11 Wargaming Computer Security
- 12 New Ideas for Security Testing
- 13 What is a Threat Scenario
- 14 Threat Scenarios same as RT?
- 15 This is just Red Teaming!
- 16 Example Scenario
- 17 Cobalt Strike - Redirectors
- 18 Putter Panda c2 callback
- 19 Cobalt Strike FTW!
- 20 C2: Internal or External
- 21 DNS Registration
- 22 Cloud Service Provider
- 23 Traffic Generation
- 24 ACME Gas - Exercise
- 25 Threat Model: Hacktivism
- 26 Scenario Development in ROE
- 27 ACME Gas - White Card Access
- 28 Lateral Movement into Servers
- 29 Lateral into Server Subnet
- 30 The Hunt Develops
- 31 And the Game would continue..
- 32 Cobalt Strike Report - MD5
- 33 Cobalt Strike - Activity
- 34 Cobalt Strike - Session
- 35 Cobalt Strike - Pivot Path
- 36 Closing Thoughts