Completed
Port scanning
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Red Team Madness - Or How I Learned To Stop Worrying and Expect Pentester Mistakes
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Pentester Mistakes
- 3 Who am I
- 4 Meet Jeremy Nie
- 5 I love security operations
- 6 The Matrix
- 7 Gordon Ramsey
- 8 The View of Blue Team
- 9 Service Desk Monkey
- 10 Network Cables
- 11 Response Plan
- 12 Looking For Assets
- 13 Whats In The Box
- 14 Not Encrypted
- 15 Identifying Information
- 16 Bash History
- 17 What Happens Next
- 18 DeTroyes
- 19 Pentester Rant
- 20 I Cant Blame Them
- 21 Last Time I Gave This Presentation
- 22 The Real Point
- 23 Simple Use Cases
- 24 Logs
- 25 Log aggregator
- 26 Big takeaway
- 27 Slides
- 28 Pentester Tools
- 29 Proxy Logs
- 30 Detecting Pentesters
- 31 Cali Callouts
- 32 Metasploit
- 33 Web Application Assessments
- 34 User Agent Strings
- 35 MTGO
- 36 Meltego
- 37 Core Impact
- 38 Pen Tester Tools
- 39 Reconnaissance
- 40 Detecting Road Machines
- 41 Pulling DNS and DHCP logs
- 42 Finding MAC addresses
- 43 Monitoring MAC addresses
- 44 Net standard naming conventions
- 45 If you see things that stand out
- 46 Use PS logged in
- 47 Detect Pass the Hash attacks
- 48 Gather Windows Security Logs
- 49 Pass The Hash
- 50 Pass The Hash Guide
- 51 Windows Event Log Monitoring
- 52 Pass The Hash Attacks
- 53 Kerberos
- 54 Arcsight
- 55 Pentester
- 56 Brute Force Attacks
- 57 Firewall Logs
- 58 Am guessing
- 59 False positives
- 60 Port scanning
- 61 Port scanning as an address
- 62 What do you do next
- 63 Disclaimer
- 64 Story Time
- 65 Pentesters
- 66 Incident Response Plan
- 67 Dont Unplug Devices
- 68 Why Not Bug Them
- 69 Be Creative Be Careful
- 70 Recap
- 71 Any Questions