YoVDO

Nemesis

Offered By: 44CON Information Security Conference via YouTube

Tags

44CON Courses Data Analysis Courses Offensive Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the cutting-edge Nemesis system in this 46-minute conference talk from 44CON 2023. Dive into the world of advanced post-exploitation data analysis and enrichment pipelines with Lee Christensen and Max Harley from SpecterOps. Learn how Nemesis unifies post-exploitation data from various C2 frameworks and tools, enabling automated processing and complex offline analysis. Discover how this innovative system can improve operator workflows, provide tradecraft assistance, and uncover new data-driven research opportunities in offensive security. Gain insights into the architectural decisions and design principles behind Nemesis, and explore its potential to revolutionize the offensive post-exploitation landscape. Understand the challenges faced by red teams regarding data management and how Nemesis addresses these issues. Witness demonstrations of time-saving automations and offensive data enrichments that Nemesis can perform. Explore the concept of a universal operator assistance platform and its implications for the future of offensive security. Join Lee Christensen, an experienced offensive security researcher, and Max Harley, a skilled operator and red team tool developer, as they present their groundbreaking work on Nemesis and its potential to transform the field of offensive data analysis.

Syllabus

Lee Christensen and Max Harley - Nemesis


Taught by

44CON Information Security Conference

Related Courses

Supply Chain Unchained - How To Be A Bad SaaS
44CON Information Security Conference via YouTube
Aviation Security 101
44CON Information Security Conference via YouTube
The Anti-Checklist Manifesto
44CON Information Security Conference via YouTube
Why Are We Still Doing Authentication Wrong?
44CON Information Security Conference via YouTube
What Do Hackers See When They Look at the Clouds
44CON Information Security Conference via YouTube