Stable Red Teaming Gaps and Musings
Offered By: YouTube
Course Description
Overview
Explore red teaming gaps and musings in this 27-minute conference talk by Samuel Sayen at Derbycon 2018. Delve into various aspects of red teaming, including definitions, limiting factors, and scope constraints. Learn about notable hacks like the Phineas Phisher and Yahoo incidents, and examine the challenges posed by scope restrictions. Discover strategies to overcome imaginary scope restraints, replicate hardware compromises, and leverage cloud resources. Gain insights into the current status quo of red teaming and explore Mandiant's offensive tools and scripts in the appendix.
Syllabus
Intro
BIO/Background
Definitions
Limiting Factors
No Time Constraint - Phineas Phisher Hack
No Tool/Infrastructure Restraints - No Easy Breach
No Scope Constraint - Yahoo hack
Scope Constraints (continued)
99 problems, but a scope ain't one.
24 Port Elephant in the Room
Holy crap.... Another Oct 4th headline
Overcome Imaginary Scope Restraints
Loosely Replicate Hardware Compromises
Abuse the Cloud
My take on current status quo for RT'ing
Appendix: Mandiant Tools/Scripts (offensive)
Related Courses
Basics of Network SecurityCoventry University via FutureLearn Offensive Security Engineering
Udemy Hands-on Penetration Testing Labs 4.0
Udemy Hack Like a Pro - Ethical Hacking from A to Z
Udemy Exfiltration with Dnscat2
Pluralsight