Главная
Study mode:
on
1
Introduction
2
USB Key Drop
3
Movies
4
USB Keys
5
Milgram
6
RSA Tokens
7
Stupid Email Tricks
8
Oh a B
9
Wait for files
10
Magnetic viewing film
11
Getting blueprints
12
Employees That Buy
13
Command Control
14
Host CNC
15
Gupt
16
OCR
17
Exfiltration
18
Encrypted Files
19
USB Key Bypass
20
Generalization
21
How to spoof
22
Automated taxi services
23
Automated energy providers
24
Rubber Duckies
25
App Tiny 85
26
Wireless Keys
Description:
Discover simple yet effective red teaming techniques in this conference talk from NorthSec. Learn how to improve USB key drop success rates, reduce command and control discoverability, leverage Outlook for social engineering, and implement other easy hacks that can significantly impact assessment outcomes. Explore topics such as movie-inspired USB key tactics, Milgram experiments, RSA token exploitation, email tricks, magnetic viewing film usage, blueprint acquisition, employee manipulation, command and control hosting, OCR exfiltration, encrypted file handling, USB key bypass methods, spoofing techniques, and automated service exploitation. Gain confidence in conducting red team engagements and be inspired to build upon these practical strategies for enhancing your cybersecurity assessment skills.

Stupid RedTeamer Tricks

NorthSec
Add to list