Главная
Study mode:
on
1
Introduction
2
Concept
3
Bryson
4
Communication Protocols
5
The People
6
Todays Red Team
7
What Do We Want
8
Defense Validation
9
Emulation vs Emulation
10
Good and Bad
11
Open Source Options
12
PowerShell
13
Ransomware
14
Networking activities
15
Lateral movement
Description:
Explore adversarial emulation techniques in this 47-minute conference talk from Derbycon 2019. Delve into key concepts presented by Bryson Bort, covering communication protocols, the evolution of red teams, defense validation, and the distinctions between emulation and simulation. Learn about open-source options, PowerShell applications, ransomware tactics, networking activities, and lateral movement strategies. Gain insights into the people behind today's red teams and understand the goals of effective adversarial emulation in cybersecurity.

Adversarial Emulation

Add to list