Explore a comprehensive conference talk on red team operations and pentester mistakes. Delve into the challenges faced during penetration testing, including issues with encrypted drives, proxy logs, and DNS records. Learn about essential tools like Kali Linux, Metasploit, and Burp Suite. Discover techniques for analyzing DHCP logs, detecting pass-the-hash attacks, and monitoring Windows security logs. Gain insights into event log monitoring, brute force attack detection, and handling false positives. Examine a real-world pentest story, discussing both effective and ineffective ways to respond to unexpected situations. Reflect on the broader implications and lessons learned from this experience in the field of cybersecurity.
Red Team Madness - Or How I Learned To Stop Worrying and Expect Pentester Mistakes