Главная
Study mode:
on
1
Intro
2
Red teaming vs other security services
3
Balance between blue and red teams
4
Red team infrastructure
5
Red team operations
6
CobolStrike lock setup
7
Beacon transcripts
8
Blingbling
9
ELQ
10
Silence Lady
11
Blue Eyes
12
Blue Team Mistakes
13
RedFoul
14
RedDummy
15
Improving red teaming
Description:
Explore advanced red team operations techniques in this conference talk from BruCON Security Conference. Discover how to leverage blue team methodologies to enhance multi-month, multi-C2teamserver, and multi-scenario engagements. Learn to manage complex infrastructures, track blue team analyses, and dynamically adjust your approach to outsmart defenders. Gain insights into centralizing operational information using ELK stack for intelligent querying and improved post-engagement feedback. Delve into novel detection methods for blue team investigations and explore reactive strategies, including honeypot creation. Cover topics such as dynamic redirectors, domain fronting, decoy websites, and html-smuggling while balancing red team objectives with evolving blue team maturity.

Using Blue Team Techniques in Red Team Ops

BruCON Security Conference
Add to list