Cookie Consent by Free Privacy Policy Generator ๐Ÿ“Œ DevOps for Red Team Initial Access Operations w/ Joff Thyer

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š DevOps for Red Team Initial Access Operations w/ Joff Thyer


๐Ÿ’ก Newskategorie: IT Security Video
๐Ÿ”— Quelle: youtube.com

Author: Black Hills Information Security - Bewertung: 0x - Views:0

/// ๐Ÿ”— For Certificates, Register and Watch Here - https://events.zoom.us/ev/AhhdhaYiGa2niXGchxa1GxQNWVByuw8QUJrzWnKPpDO0WvLkVMza~Apgb00RtIvF3fB7sKKWCsMrIGnXh6o_nMOoERbEkS9VVKpaoOQjze6Vea1419Sq4jQ1Xci2EcaizymWzcxoSM3nwQg TD;LR This webcast aims to spark ideas and discussion on source code obfuscation and dynamically triggered child pipeline usage. This presentation describes some of the challenges of malware development for Red Team initial access operations, and how continuous integration/continuous development (CICD) pipelines can be employed to assist in solving the challenges. The presentation will start by introducing some of the known techniques employed by modern endpoint defense software, and then describe how a CICD approach can be used to enable unique malware artifact production for bypass and initial access operational success. It is hoped that this presentation will stimulate ideas and discussion surrounding both source code obfuscation and related dynamically triggered child pipeline utilization. Chat with your fellow attendees in the Black Hills Infosec Discord server here: https://discord.gg/BHIS -- in the #webcast-live-chat channel.

...



๐Ÿ“Œ DevOps for Red Team Initial Access Operations w/ Joff Thyer


๐Ÿ“ˆ 102.89 Punkte

๐Ÿ“Œ DevOps for Red Team Initial Access Operations w/ Joff Thyer


๐Ÿ“ˆ 102.89 Punkte

๐Ÿ“Œ DevOps for Red Team Initial Access Operations w/ Joff Thyer


๐Ÿ“ˆ 102.89 Punkte

๐Ÿ“Œ Fun with Android APK's, Joff Thyer - Paul's Security Weekly #566


๐Ÿ“ˆ 52.66 Punkte

๐Ÿ“Œ IPv6: How to Securely Start Deploying w/ Joff Thyer (1-Hour)


๐Ÿ“ˆ 52.66 Punkte

๐Ÿ“Œ IPv6 Tunneling - Joff Thyer - PSW #657


๐Ÿ“ˆ 52.66 Punkte

๐Ÿ“Œ AASLR: 15 minutes with Joff Thyer | Antisyphon Instructor


๐Ÿ“ˆ 52.66 Punkte

๐Ÿ“Œ Shellcode Execution with Python | Joff Thyer | 1-Hour


๐Ÿ“ˆ 52.66 Punkte

๐Ÿ“Œ Shellcode Execution with Python | Joff Thyer | Part 1


๐Ÿ“ˆ 52.66 Punkte

๐Ÿ“Œ Part 2: Shellcode Execution with Python | Joff Thyer


๐Ÿ“ˆ 52.66 Punkte

๐Ÿ“Œ Part 3: Shellcode Execution with Python | Joff Thyer


๐Ÿ“ˆ 52.66 Punkte

๐Ÿ“Œ Anatomy of a Python Scripted Remote Buffer Overflow w/ Joff Thyer | 1-Hour


๐Ÿ“ˆ 52.66 Punkte

๐Ÿ“Œ Exploring the Python "psutil" Module Under Windows w/ Joff Thyer


๐Ÿ“ˆ 52.66 Punkte

๐Ÿ“Œ Initial Access Operations Part 2: Offensive DevOps


๐Ÿ“ˆ 38.87 Punkte

๐Ÿ“Œ Working with Azure DevOps using the Azure DevOps CLI | The DevOps Lab


๐Ÿ“ˆ 29.9 Punkte

๐Ÿ“Œ Azure DevOps vs. AWS DevOps: Comparing Two Powerhouses in Cloud Development and Operations


๐Ÿ“ˆ 29.37 Punkte

๐Ÿ“Œ Initial Access Operations Part 1: The Windows Endpoint Defense Technology Landscape


๐Ÿ“ˆ 28.9 Punkte

๐Ÿ“Œ DEF CON Safe Mode Red Team Village - Walter Cuestas - Initial Compromise Through Web Side


๐Ÿ“ˆ 25.99 Punkte

๐Ÿ“Œ Red Team v. Blue Team? They Are In Fact One โ€“ The Purple Team


๐Ÿ“ˆ 25.91 Punkte

๐Ÿ“Œ AWS DevOps โ€” Configuring IAM for DevOps Role with Restricted Access


๐Ÿ“ˆ 24.76 Punkte

๐Ÿ“Œ GUEST ESSAY: โ€˜Initial access brokersโ€™ โ€” IABs โ€” specialize in enabling surreptitious access


๐Ÿ“ˆ 24.29 Punkte

๐Ÿ“Œ Minimum operations in a binary matrix to make it same as initial one


๐Ÿ“ˆ 24.07 Punkte

๐Ÿ“Œ DEF CON Safe Mode Red Team Village - Chris Cottrell - Guerrilla Red Team Decentralizing Adversary


๐Ÿ“ˆ 22.72 Punkte

๐Ÿ“Œ DEF CON Safe Mode Red Team Village -Austin Marck - erpwnage Red Team Approach to Targeting SAP


๐Ÿ“ˆ 22.72 Punkte

๐Ÿ“Œ DEF CON Safe Mode Red Team Village - Erdener Uyan, Gรถkberk Gรผlgรผn -Executing Red Team Scenarios


๐Ÿ“ˆ 22.72 Punkte

๐Ÿ“Œ DEF CON Safe Mode Red Team Village - Sajal Thomas - Modern Red Team Tradecraft


๐Ÿ“ˆ 22.72 Punkte

๐Ÿ“Œ DEF CON Safe Mode Red Team Village - Mert Coskuner- RedTeamOps Managing Red Team Infrastructure


๐Ÿ“ˆ 22.72 Punkte

๐Ÿ“Œ DEF CON 29 Red Team Village - Bruce Schneier - AI and Red Team Village Panel


๐Ÿ“ˆ 22.72 Punkte

๐Ÿ“Œ Guide To Red Team Operations


๐Ÿ“ˆ 20.8 Punkte

๐Ÿ“Œ Ninja - Open Source C2 Server Created For Stealth Red Team Operations


๐Ÿ“ˆ 20.8 Punkte

๐Ÿ“Œ HTMLSmuggler - HTML Smuggling Generator And Obfuscator For Your Red Team Operations


๐Ÿ“ˆ 20.8 Punkte

๐Ÿ“Œ Learn About SEC565: Red Team Operations and Adversary Emulation


๐Ÿ“ˆ 20.8 Punkte

๐Ÿ“Œ IT-Sicherheit und DevOps: Drei Schritte, wie man DevOps sicher und schnell umsetzt


๐Ÿ“ˆ 19.93 Punkte

๐Ÿ“Œ IT-Sicherheit und DevOps: Drei Schritte, wie man DevOps sicher und schnell umsetzt


๐Ÿ“ˆ 19.93 Punkte











matomo