Red Team Madness - Or How I Learned To Stop Worrying and Expect Pentester Mistakes

Red Team Madness - Or How I Learned To Stop Worrying and Expect Pentester Mistakes

via YouTube Direct link

Detecting Road Machines

40 of 71

40 of 71

Detecting Road Machines

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Red Team Madness - Or How I Learned To Stop Worrying and Expect Pentester Mistakes

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Pentester Mistakes
  3. 3 Who am I
  4. 4 Meet Jeremy Nie
  5. 5 I love security operations
  6. 6 The Matrix
  7. 7 Gordon Ramsey
  8. 8 The View of Blue Team
  9. 9 Service Desk Monkey
  10. 10 Network Cables
  11. 11 Response Plan
  12. 12 Looking For Assets
  13. 13 Whats In The Box
  14. 14 Not Encrypted
  15. 15 Identifying Information
  16. 16 Bash History
  17. 17 What Happens Next
  18. 18 DeTroyes
  19. 19 Pentester Rant
  20. 20 I Cant Blame Them
  21. 21 Last Time I Gave This Presentation
  22. 22 The Real Point
  23. 23 Simple Use Cases
  24. 24 Logs
  25. 25 Log aggregator
  26. 26 Big takeaway
  27. 27 Slides
  28. 28 Pentester Tools
  29. 29 Proxy Logs
  30. 30 Detecting Pentesters
  31. 31 Cali Callouts
  32. 32 Metasploit
  33. 33 Web Application Assessments
  34. 34 User Agent Strings
  35. 35 MTGO
  36. 36 Meltego
  37. 37 Core Impact
  38. 38 Pen Tester Tools
  39. 39 Reconnaissance
  40. 40 Detecting Road Machines
  41. 41 Pulling DNS and DHCP logs
  42. 42 Finding MAC addresses
  43. 43 Monitoring MAC addresses
  44. 44 Net standard naming conventions
  45. 45 If you see things that stand out
  46. 46 Use PS logged in
  47. 47 Detect Pass the Hash attacks
  48. 48 Gather Windows Security Logs
  49. 49 Pass The Hash
  50. 50 Pass The Hash Guide
  51. 51 Windows Event Log Monitoring
  52. 52 Pass The Hash Attacks
  53. 53 Kerberos
  54. 54 Arcsight
  55. 55 Pentester
  56. 56 Brute Force Attacks
  57. 57 Firewall Logs
  58. 58 Am guessing
  59. 59 False positives
  60. 60 Port scanning
  61. 61 Port scanning as an address
  62. 62 What do you do next
  63. 63 Disclaimer
  64. 64 Story Time
  65. 65 Pentesters
  66. 66 Incident Response Plan
  67. 67 Dont Unplug Devices
  68. 68 Why Not Bug Them
  69. 69 Be Creative Be Careful
  70. 70 Recap
  71. 71 Any Questions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.