YoVDO

Red Team Methodology - A Naked Look

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Ansible Courses Infrastructure Automation Courses

Course Description

Overview

Explore a comprehensive conference talk on Red Team Methodology, offering a detailed look at the principles and practices of red teaming. Delve into the goals, target maturity, and key differences of red team operations. Gain insights into pre-engagement activities, external and internal tactics, and communication strategies. Learn about various tools and techniques, including NTLM bruting, social engineering, infrastructure automation with Ansible, and persistence methods. Discover how to effectively blend in during operations and understand the importance of proper reporting. Enhance your red teaming skills with practical knowledge from an experienced professional in the field.

Syllabus

Intro
Goals
Red Team Target Maturity
Red Team Key Difference
Why this talk? I'm already a pro
My Red Team Core Principals
Core Principals: Pre-Gig
Question
Domains
Favorite Dorks
Breach Data
Core Principals: External
NTLM Bruting
Core Principals: SE
Infr. Automation with Ansible
Ansible - Tasks
Ansible - Modules
Template Injection
Azure Information Protection (AIP)
Core Principals: Internal
Tools/Tactics
Lowpriv - Chrome
Persistence & Movement
Blending In
COM Hijacking
Core Principals: Communication/Reporting


Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network