Главная
Study mode:
on
1
Introduction
2
Pentester Mistakes
3
Who am I
4
Meet Jeremy Nie
5
I love security operations
6
The Matrix
7
Gordon Ramsey
8
The View of Blue Team
9
Service Desk Monkey
10
Network Cables
11
Response Plan
12
Looking For Assets
13
Whats In The Box
14
Not Encrypted
15
Identifying Information
16
Bash History
17
What Happens Next
18
DeTroyes
19
Pentester Rant
20
I Cant Blame Them
21
Last Time I Gave This Presentation
22
The Real Point
23
Simple Use Cases
24
Logs
25
Log aggregator
26
Big takeaway
27
Slides
28
Pentester Tools
29
Proxy Logs
30
Detecting Pentesters
31
Cali Callouts
32
Metasploit
33
Web Application Assessments
34
User Agent Strings
35
MTGO
36
Meltego
37
Core Impact
38
Pen Tester Tools
39
Reconnaissance
40
Detecting Road Machines
41
Pulling DNS and DHCP logs
42
Finding MAC addresses
43
Monitoring MAC addresses
44
Net standard naming conventions
45
If you see things that stand out
46
Use PS logged in
47
Detect Pass the Hash attacks
48
Gather Windows Security Logs
49
Pass The Hash
50
Pass The Hash Guide
51
Windows Event Log Monitoring
52
Pass The Hash Attacks
53
Kerberos
54
Arcsight
55
Pentester
56
Brute Force Attacks
57
Firewall Logs
58
Am guessing
59
False positives
60
Port scanning
61
Port scanning as an address
62
What do you do next
63
Disclaimer
64
Story Time
65
Pentesters
66
Incident Response Plan
67
Dont Unplug Devices
68
Why Not Bug Them
69
Be Creative Be Careful
70
Recap
71
Any Questions
Description:
Explore a comprehensive conference talk on red team operations and pentester mistakes. Gain insights into the perspective of blue team members and service desk personnel while learning about common pentester errors. Discover techniques for detecting pentesters, including analyzing logs, monitoring user agent strings, and identifying suspicious MAC addresses. Delve into topics such as pass-the-hash attacks, Kerberos, and brute force attempts. Learn about incident response plans and creative approaches to handling pentester activities. Benefit from real-world stories and practical advice on improving security operations and effectively managing penetration testing engagements.

Red Team Madness - Or How I Learned To Stop Worrying and Expect Pentester Mistakes

Add to list