Главная
Study mode:
on
1
Introduction
2
What prompted this presentation
3
Sun Encrypted Drive
4
Proxy and DNS logs
5
Callouts
6
Kali Linux
7
Metasploit
8
Burp Suite
9
Nikto
10
MeltyGo
11
Korra
12
DHCP logs
13
Look at all DHCP addresses
14
Make it simple for yourself
15
Use sysinternals tool
16
Detect pass the hash
17
Get Windows security logs
18
Windows admins dont understand how this works
19
Microsofts Guide
20
NSA Guide
21
Event Log Monitoring
22
Event Log Detection
23
Brute Force Attacks
24
Username Guessing
25
False Positives
26
Port Scans
27
Pentest
28
Pen Test Story
29
The Gig Was Up
30
The Good Way To Respond
31
The Bad Way To Respond
32
Did I Work With Thee
33
The Bigger Takeaway
Description:
Explore a comprehensive conference talk on red team operations and pentester mistakes. Delve into the challenges faced during penetration testing, including issues with encrypted drives, proxy logs, and DNS records. Learn about essential tools like Kali Linux, Metasploit, and Burp Suite. Discover techniques for analyzing DHCP logs, detecting pass-the-hash attacks, and monitoring Windows security logs. Gain insights into event log monitoring, brute force attack detection, and handling false positives. Examine a real-world pentest story, discussing both effective and ineffective ways to respond to unexpected situations. Reflect on the broader implications and lessons learned from this experience in the field of cybersecurity.

Red Team Madness - Or How I Learned To Stop Worrying and Expect Pentester Mistakes

Add to list