YoVDO

Stable Red Teaming Gaps and Musings

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Ethical Hacking Courses Offensive Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore red teaming gaps and musings in this 27-minute conference talk by Samuel Sayen at Derbycon 2018. Delve into various aspects of red teaming, including definitions, limiting factors, and scope constraints. Learn about notable hacks like the Phineas Phisher and Yahoo incidents, and examine the challenges posed by scope restrictions. Discover strategies to overcome imaginary scope restraints, replicate hardware compromises, and leverage cloud resources. Gain insights into the current status quo of red teaming and explore Mandiant's offensive tools and scripts in the appendix.

Syllabus

Intro
BIO/Background
Definitions
Limiting Factors
No Time Constraint - Phineas Phisher Hack
No Tool/Infrastructure Restraints - No Easy Breach
No Scope Constraint - Yahoo hack
Scope Constraints (continued)
99 problems, but a scope ain't one.
24 Port Elephant in the Room
Holy crap.... Another Oct 4th headline
Overcome Imaginary Scope Restraints
Loosely Replicate Hardware Compromises
Abuse the Cloud
My take on current status quo for RT'ing
Appendix: Mandiant Tools/Scripts (offensive)


Related Courses

Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam
Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax
MSc Cyber Security
Coventry University via FutureLearn
Network Security - Introduction to Network Security
New York University (NYU) via edX
Network Security - Advanced Topics
New York University (NYU) via edX