Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Red Team Madness - Or How I Learned To Stop Worrying and Expect Pentester Mistakes

via YouTube

Overview

Explore a comprehensive conference talk on red team operations and pentester mistakes. Delve into the challenges faced during penetration testing, including issues with encrypted drives, proxy logs, and DNS records. Learn about essential tools like Kali Linux, Metasploit, and Burp Suite. Discover techniques for analyzing DHCP logs, detecting pass-the-hash attacks, and monitoring Windows security logs. Gain insights into event log monitoring, brute force attack detection, and handling false positives. Examine a real-world pentest story, discussing both effective and ineffective ways to respond to unexpected situations. Reflect on the broader implications and lessons learned from this experience in the field of cybersecurity.

Syllabus

Introduction
What prompted this presentation
Sun Encrypted Drive
Proxy and DNS logs
Callouts
Kali Linux
Metasploit
Burp Suite
Nikto
MeltyGo
Korra
DHCP logs
Look at all DHCP addresses
Make it simple for yourself
Use sysinternals tool
Detect pass the hash
Get Windows security logs
Windows admins dont understand how this works
Microsofts Guide
NSA Guide
Event Log Monitoring
Event Log Detection
Brute Force Attacks
Username Guessing
False Positives
Port Scans
Pentest
Pen Test Story
The Gig Was Up
The Good Way To Respond
The Bad Way To Respond
Did I Work With Thee
The Bigger Takeaway

Reviews

Start your review of Red Team Madness - Or How I Learned To Stop Worrying and Expect Pentester Mistakes

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.