Rezultati pretraživanja
  1. 10. sij

    I am a HUGE fan of VECTR, a tool for tracking and reporting Red and Purple Team exercises. We have an entire lab in on using it. Here is how to import the Iranian TTPs into VECTR to create heat maps of detective and preventive controls.

  2. 9. ožu 2010.

    at with is a great course. picking up some tips for when i mentor in april.

  3. 7. stu 2017.

    Spent the last two days learning red team ops and threat emulation with of I don't know who's more excited to put this knowledge to use: us, or the blue team

  4. 10. kol 2010.
    Odgovor korisniku/ci

    I'll give you a wave from the nosebleeds

  5. 13. lis 2019.

    +1 We cover it in the SANS Red Team course under Defense Evasion and Execution. Technically it is T1027

  6. Sign up for Red Team Exercises & Adversary Emulation at before February 12 and save!

  7. 30. sij

    VECTR update was just released version 5.4 is out! Thank you SANS has a lab for APT33 and this version makes it even easier to map already tested TTPs to adveraries!

  8. 27. sij

    Sign up for Red Team Exercises and Adversary Emulation It includes conferences passes as well! Will be co-teaching with 2-day long lab is emulating the Iranian threat actor APT33!

  9. 23. sij
    Odgovor korisnicima i sljedećem broju korisnika:

    invoke_wmi worked with agent creds on 2.5. Same lab, same options (I am going through labs).

  10. NEW courses at 2019: - Blue Team Fundamentals: Security Operations and Analysis - Red Team Exercises & Adversary Emulation - Advanced Incident Response, Threat Hunting, and Digital Forensics View agenda:

  11. 12. lis 2019.
    Odgovor korisnicima i sljedećem broju korisnika:

    I will be teaching the 2 days before the 6 day classes start at . I can't stay for though :( You all will do awesome as usual. The lobby/bar/drinking seems to help your team bond :P

  12. 1. lis 2019.

    These are all covered in Should be enough to get you started!

  13. 26. lip 2019.

    Hey folks! Here's a rough intro vid for Recon-ng v5. Mainly intended for course content maintainers and authors, but anyone is welcome to watch and learn.

    Prikaži ovu nit
  14. 29. svi 2019.

    Anyone has good study material for Exam (web app and penetration testing)?

  15. 7. tra 2019.

    Let's kick off with the Red Team Operations and Threat Emulation training () Orlando

  16. 12. pro 2018.

    Wrapping up the final day of at with . Tomorrow will roll right into .

  17. 11. pro 2018.

    Day one down at . So far so pretty awesome stuff.

  18. Finished up taught by - great info, great labs, and plenty of ideas to take back to work.

  19. Every fail is a new opportunity. Could not reach the DMZ in the lab but I did end up finding a nice python script to do ping sweeps.

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.