Stable Red Teaming Gaps and Musings
Offered By: YouTube
Course Description
Overview
Explore red teaming gaps and musings in this 27-minute conference talk by Samuel Sayen at Derbycon 2018. Delve into various aspects of red teaming, including definitions, limiting factors, and scope constraints. Learn about notable hacks like the Phineas Phisher and Yahoo incidents, and examine the challenges posed by scope restrictions. Discover strategies to overcome imaginary scope restraints, replicate hardware compromises, and leverage cloud resources. Gain insights into the current status quo of red teaming and explore Mandiant's offensive tools and scripts in the appendix.
Syllabus
Intro
BIO/Background
Definitions
Limiting Factors
No Time Constraint - Phineas Phisher Hack
No Tool/Infrastructure Restraints - No Easy Breach
No Scope Constraint - Yahoo hack
Scope Constraints (continued)
99 problems, but a scope ain't one.
24 Port Elephant in the Room
Holy crap.... Another Oct 4th headline
Overcome Imaginary Scope Restraints
Loosely Replicate Hardware Compromises
Abuse the Cloud
My take on current status quo for RT'ing
Appendix: Mandiant Tools/Scripts (offensive)
Related Courses
Ethical HackingIndian Institute of Technology, Kharagpur via Swayam Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax MSc Cyber Security
Coventry University via FutureLearn Network Security - Introduction to Network Security
New York University (NYU) via edX Network Security - Advanced Topics
New York University (NYU) via edX