Overview
Explore offensive and defensive cybersecurity strategies in this 28-minute conference talk from Derbycon 7 (2017). Delve into various attack and defense techniques, including phishing, social engineering, malicious devices, and password security. Learn about basic, better, and best practices for both red and blue teams, covering topics such as crafting effective phishing campaigns, implementing robust defenses, and utilizing advanced detection methods. Gain valuable insights into the ongoing battle between attackers and defenders, with practical tips for improving both offensive and defensive capabilities in the realm of cybersecurity.
Syllabus
Intro
BASIC ATTACK Phishing Social Engineering Technique
SPY BASIC DEFENSE SPY Phishing
SPY SETTER DEFENSE SPY Phishing
BETTER ATTACK Phishing Send a meeting invite instead of a message
BEST ATTACK Phishing
SPY DETECTION TECHNIQUES SPY Phishing
BASIC ATTACK Malicious Devices
BETTER ATTACK Malicious Devices
BEST ATTACK Malicious Devices
BASIC ATTACK Passwords
SPY BASIC DEFENSE SPY Passwords
BETTER ATTACK & DEFENSE Passwords
BEST ATTACK Passwords
SPY DETECTION TECHNIQUES SPY Authentication Netlogon