-
I am a HUGE fan of VECTR, a tool for tracking and reporting Red and Purple Team exercises. We have an entire lab in
#SEC564 on using it. Here is how to import the Iranian TTPs into VECTR to create heat maps of detective and preventive controls. https://github.com/SecurityRiskAdvisors/VECTR/blob/master/media/Importing_CTI_into_VECTR_010920.pdf … -
#sec560 at#sans2010 with@edskoudis is a great course. picking up some tips for when i mentor#sec564 in april. -
Spent the last two days learning red team ops and threat emulation with
@joevest of@SANSInstitute#SEC564 I don't know who's more excited to put this knowledge to use: us, or the blue team pic.twitter.com/zjiJNscRWL
-
@WFNYScott I'll give you a wave from the nosebleeds#sec564 -
+1 We cover it in the SANS Red Team course
#SEC564 under Defense Evasion and Execution. Technically it is T1027 pic.twitter.com/ESfVNQiXAH
-
Sign up for
#SEC564 Red Team Exercises & Adversary Emulation at#SANS2020 before February 12 and save! http://www.sans.org/u/ZSM pic.twitter.com/poxNkb7IeV
-
VECTR update was just released version 5.4 is out! Thank you
@secrisk SANS#SEC564 has a lab for APT33 and this version makes it even easier to map already tested TTPs to adveraries! https://github.com/SecurityRiskAdvisors/VECTR/blob/master/media/VECTR%20v5_4%20Feature%20Breakdown.pdf … -
Sign up for
#SEC564 Red Team Exercises and Adversary Emulation@WWHackinFest It includes conferences passes as well! Will be co-teaching with@dmay3r 2-day long lab is emulating the Iranian threat actor APT33!@SANSPenTest#redteamhttps://twitter.com/strandjs/status/1221824851863724032 … -
invoke_wmi worked with agent creds on 2.5. Same lab, same options (I am going through
#SEC564 labs). pic.twitter.com/iXQ2ONx751
-
NEW
#InfoSec courses at#SANSCDI 2019:#SEC450 - Blue Team Fundamentals: Security Operations and Analysis#SEC564 - Red Team Exercises & Adversary Emulation#FOR508 - Advanced Incident Response, Threat Hunting, and Digital Forensics View agenda: http://www.sans.org/u/VZf pic.twitter.com/Af1wymBEFf
-
-
These are all covered in
#sec564 Should be enough to get you started! https://twitter.com/flakpaket/status/1179132173363929089 … -
Learn from some of the best in the
#cybersecurity business at#SANSCDI#SEC564 w/@jorgeorchilles#SEC573 w/@MarkBaggett#SEC580 w/@jeffmcjunkin#SEC660 w/@Steph3nSims Learn more: http://www.sans.org/u/W61 pic.twitter.com/Gr0BQkCn1b
-
Hey folks! Here's a rough intro vid for Recon-ng v5. Mainly intended for course content maintainers and authors, but anyone is welcome to watch and learn.
#reconng@SANSInstitute@dalemeredith@davidbclinton#SEC542#SEC560#SEC504#SEC460#SEC487#SEC564 https://www.youtube.com/watch?v=WVEv7peHerw …Prikaži ovu nit -
Let's kick off with the Red Team Operations and Threat Emulation training (
#SEC564)@SANSPenTest Orlando#SANS2019#security#trainingpic.twitter.com/GbKXN3capP
-
-
Day one down
#SEC564 at#SANS#CDI . So far so pretty awesome stuff.#keeplearning#infosec#threatintel -
Finished up
@SANSInstitute#SEC564 taught by@joevest - great info, great labs, and plenty of ideas to take back to work. -
Every fail is a new opportunity. Could not reach the DMZ in the lab but I did end up finding a nice python script to do ping sweeps.
#SEC564
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.