YoVDO

Stable Red Teaming Gaps and Musings

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Ethical Hacking Courses Offensive Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore red teaming gaps and musings in this 27-minute conference talk by Samuel Sayen at Derbycon 2018. Delve into various aspects of red teaming, including definitions, limiting factors, and scope constraints. Learn about notable hacks like the Phineas Phisher and Yahoo incidents, and examine the challenges posed by scope restrictions. Discover strategies to overcome imaginary scope restraints, replicate hardware compromises, and leverage cloud resources. Gain insights into the current status quo of red teaming and explore Mandiant's offensive tools and scripts in the appendix.

Syllabus

Intro
BIO/Background
Definitions
Limiting Factors
No Time Constraint - Phineas Phisher Hack
No Tool/Infrastructure Restraints - No Easy Breach
No Scope Constraint - Yahoo hack
Scope Constraints (continued)
99 problems, but a scope ain't one.
24 Port Elephant in the Room
Holy crap.... Another Oct 4th headline
Overcome Imaginary Scope Restraints
Loosely Replicate Hardware Compromises
Abuse the Cloud
My take on current status quo for RT'ing
Appendix: Mandiant Tools/Scripts (offensive)


Related Courses

Basics of Network Security
Coventry University via FutureLearn
Offensive Security Engineering
Udemy
Hands-on Penetration Testing Labs 4.0
Udemy
Hack Like a Pro - Ethical Hacking from A to Z
Udemy
Exfiltration with Dnscat2
Pluralsight