Explore a comprehensive conference talk on red team operations and pentester mistakes. Gain insights into the perspective of blue team members and service desk personnel while learning about common pentester errors. Discover techniques for detecting pentesters, including analyzing logs, monitoring user agent strings, and identifying suspicious MAC addresses. Delve into topics such as pass-the-hash attacks, Kerberos, and brute force attempts. Learn about incident response plans and creative approaches to handling pentester activities. Benefit from real-world stories and practical advice on improving security operations and effectively managing penetration testing engagements.
Red Team Madness - Or How I Learned To Stop Worrying and Expect Pentester Mistakes