- 154
- 28 386
CyberThreatPOV
United States
Приєднався 21 кві 2022
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics.
Episode 120: Demystifying Pentests - What Every Organization Needs to Know
Welcome to another episode of The Cyber Threat Perspective! In this episode, Spencer and Tyler dive deep into the world of penetration testing and what every organization needs to know.
- The importance of differentiating pen tests from vulnerability assessments.
- Key points to look for when selecting a pen test provider.
- The pen testing process, from preparation to execution.
- The significance of communication and support throughout the engagement.
- Best practices for handling post-engagement activities and remediations.
For more insights, visit offsec.blog and securit360.com.
Remember to tune in every Friday for new episodes!
- The importance of differentiating pen tests from vulnerability assessments.
- Key points to look for when selecting a pen test provider.
- The pen testing process, from preparation to execution.
- The significance of communication and support throughout the engagement.
- Best practices for handling post-engagement activities and remediations.
For more insights, visit offsec.blog and securit360.com.
Remember to tune in every Friday for new episodes!
Переглядів: 9
Відео
Episode119: Lessons Natural Disasters Can Teach Us About Cybersecurity
Переглядів 2016 годин тому
In Episode 119 of The Cyber Threat Perspective, Spencer and guest Mark Brophy discuss how lessons from natural disasters can inform robust cybersecurity strategies. They explore parallels between storm preparedness and cybersecurity, emphasizing the importance of layered defenses and proactive planning. - The role of identity monitoring and canaries in detecting attackers - The importance of th...
Episode 118: 2025 - A CISO's Perspective with Mike Whitt
Переглядів 46Місяць тому
In this episode, we’re discussing what a seasoned CISO is focused on going into 2025. Mike Whitt is a Cheif Information Security Officer in the financial sector with over 20 years of experience building teams, security programs, and leading organizations to a more secure posture. www.linkedin.com/in/mike-whitt-a4b4802/ Blog: offsec.blog/ UA-cam: www.youtube.com/@CyberThreatPOV Twitter: twitter....
Episode 117: Why Do Pentests Cost So Much
Переглядів 178Місяць тому
In this episode of The Cyber Threat Perspective, Brad and Spencer dive into the reasons behind the high costs of penetration tests (pen tests) and their true value in cybersecurity strategies. Get a comprehensive understanding of why investing in pen tests can save organizations from financial and reputational damage. - Importance of pen tests in identifying vulnerabilities missed by automated ...
Episode 116: Painfully Persistent Problems - Weak Passwords
Переглядів 56Місяць тому
securit360.com offsec.blog In this episode, we’re diving into one of the most enduring cybersecurity challenges-weak passwords. We’ll explore how poor password practices and identity management pitfalls leave organizations vulnerable to compromise. From understanding the most common mistakes to implementing effective defenses, we’re breaking down what it takes to fortify your systems against at...
Episode 115: How to understand and address risk w/ Robert McElroy
Переглядів 28Місяць тому
In this episode, we discuss the broad concept of risk, what it is, and how to manage it. This episode is a great way to begin understanding how to develop an overall risk management strategy at your organization or understand how a risk management program might work for you. You find out more about what Rob and his team can do here: www.securit360.com/services/managed-services-consulting/ Reach...
Episode 114: Making Penetration Test Results Actionable
Переглядів 532 місяці тому
In this episode of The Cyber Threat Perspective, Spencer and Brad discuss the crucial steps to make penetration test results actionable. Learn how to turn findings into improvements for a stronger security posture. - Prioritizing and addressing pen test findings amidst limited resources - Strategies for efficient remediation and resource allocation - The impact of timing and the “Q4 rush” on pe...
Episode 113: Phishing with Malicious RDP Files
Переглядів 1282 місяці тому
Join Brad and Spencer from SecurIT360 as they dive into the latest phishing techniques involving malicious RDP files. Stay informed on how to protect your organization from these sophisticated cyber threats. - Introduction to Midnight Blizzard (APT 29) and their new phishing tactics - Explanation of RDP files and their capabilities - Analysis of how RDP files are manipulated and used in attacks...
Episode 112: Key Insights From The Microsoft Digital Defense Report 2024
Переглядів 732 місяці тому
Get the essential takeaways from the Microsoft Digital Defense Report 2024 in this episode. Brad and Spencer discuss the latest cybersecurity trends, threats, and actionable insights for your organization. - The necessity of active monitoring and the benefits of third-party solutions. - The importance of understanding and analyzing attack paths. - Crucial statistics and implications from penetr...
Episode 111: Red Team Tools OST Managing Open-Source Threats
Переглядів 843 місяці тому
Join Brad and Spencer from SecurIT 360 as they dive into the complexities and ethical dilemmas surrounding red team tools in cybersecurity. In this episode, they dissect the latest research and discuss the dual-use nature of offensive security tools. - Ambiguity and confusion in offensive security terminology. - Differences between threat emulation and simulation. - Ethical concerns about the d...
Silent But Deadly The Stinky Truth About Active Directory Permissions
Переглядів 1653 місяці тому
Silent But Deadly The Stinky Truth About Active Directory Permissions
Episode 110:AD Security Workshop Preview
Переглядів 903 місяці тому
Join Brad and Spencer from SecurIT 360's Offensive Security Group as they preview an upcoming conference workshop on Active Directory (AD) Security. Discover practical insights and hands-on techniques for hardening your AD environment against cyberattacks. - Overview of the SecureCarolina's CyberSC conference workshop. - Common misconfigurations in AD and how to fix them. - Importance of passwo...
Episode 109: Current State of Pentesting - Internal and External
Переглядів 853 місяці тому
Join us for Episode 109 of "The Cyber Threat Perspective" where Spencer and Tyler dive into the current state of penetration testing. From client engagements to the latest trends in the industry, we've got you covered! - Challenges in pen testing, including time constraints and missed findings. - Communication and collaboration strategies during client engagements. - Key trends and issues in cl...
Episode 108: New tales from the trenches!
Переглядів 563 місяці тому
Welcome to Episode 108 of The Cyber Threat Perspective! Join Tyler and Brad as they dive into the latest behind-the-scenes tales from their penetration testing adventures. - Authenticated vs Unauthenticated web application testing methodologies. - Risks and exploits tied to user enumeration and public information scraping. - Critical insights on securing identities in a Zero Trust environment. ...
Episode 107: How To Defend Against Lateral Movement
Переглядів 3264 місяці тому
Protect your network from lateral movement attacks! In this episode, Brad and Spencer from SecurIT360's offensive security group share essential tips and strategies. - Definition and importance of lateral movement in ransomware attacks. - Containment strategies like network segmentation and firewalls. - Legitimate yet risky tools like RDP and remote access software. - Key targets and initial ac...
Episode 106: An Overview of Cyber Risk
Переглядів 294 місяці тому
Episode 106: An Overview of Cyber Risk
Episode 105: How To Monitor Your Attack Surface
Переглядів 824 місяці тому
Episode 105: How To Monitor Your Attack Surface
Episode 104: How To Get Into Cyber For First Responders
Переглядів 525 місяців тому
Episode 104: How To Get Into Cyber For First Responders
Episode 102: The Global CrowdStrike Outage
Переглядів 965 місяців тому
Episode 102: The Global CrowdStrike Outage
Episode 101: Infostealers - 10,000 Victims a Day
Переглядів 975 місяців тому
Episode 101: Infostealers - 10,000 Victims a Day
Episode 100: The OpenSSH RegreSSHion Vulnerability
Переглядів 946 місяців тому
Episode 100: The OpenSSH RegreSSHion Vulnerability
Episode 99: ToolTime - OneDriveEnum and AD Miner
Переглядів 1816 місяців тому
Episode 99: ToolTime - OneDriveEnum and AD Miner
Episode 98: Current State of M365 Attacks: Initial Access
Переглядів 1176 місяців тому
Episode 98: Current State of M365 Attacks: Initial Access
Episode 97: Current State of M365 Attacks: Enumeration
Переглядів 2256 місяців тому
Episode 97: Current State of M365 Attacks: Enumeration
Episode 96: How to Harden Active Directory to Prevent Cyber Attacks
Переглядів 2,2 тис.7 місяців тому
Episode 96: How to Harden Active Directory to Prevent Cyber Attacks
Episode 95: Navigating the Legal Maze of Cybersecurity with Alexander Boyd
Переглядів 537 місяців тому
Episode 95: Navigating the Legal Maze of Cybersecurity with Alexander Boyd
Episode 94: Defending Against Ransomware Part 2
Переглядів 537 місяців тому
Episode 94: Defending Against Ransomware Part 2
Episode 93: Defending Against Ransomware Part 1
Переглядів 907 місяців тому
Episode 93: Defending Against Ransomware Part 1
Episode 92: Cybersecurity Training and Certification Advice
Переглядів 1018 місяців тому
Episode 92: Cybersecurity Training and Certification Advice
I just finished and passed the HTB cpts and I can say that this video aged badly. The cpts is bar none the most challenging exam that was mentioned on this video, I can’t wait until these guys even try to attempt it, it will truly separate the occasional “I hack for fun” people from the real engineers
I discovered your content on Spotify and have become an avid listener. I am just getting into Cyber Security and your podcasts help me understand how security works. Thanks.
Will this content ever be available on-demand? If you guys put out a course, I'd happily pay for it
Hey @worldunfolds thank you! Stay tuned and follow Spencer for more cool stuff like this coming to the public in the future!
My dads friend works with sam as a part time firefighter and recommended this video. Was great thanks! I am getting my Masters in Cybersecurity Analytics and looking at starting the HackTheBox CPTS certification training path this month since the OSCP is so expensive.
hey that's awesome! If you have any questions, feel free to reach out.
Thanks Spencer for another amazing and educational video!
Thanks so much @hax4coffee appreciate it! 💪
Please provide a link to the courses or workshops.
This was a private workshop at a conference. Stay tuned and follow Spencer on social media to hear about public workshops coming in the future!
Thanks team, enjoy your insights 👍
So welcome thank you for the comment!
It's nice seeing content that goes beyond 'how to break into infosec' and actually helps us on the front lines slapping the keyboard and working with stakeholders. Not that I am some grizzled vet, just saying I appreciate the deeper content.
That means a lot @Jesse_Johnson, thank you!
As someone who follows chess and CyberThreatPOV, I really thought I was about to watch a chess strategy video lol
It fits though right?! :D
nice overview. i remember in the mid 90's how simple it was to spook emails. Ah the good old days..
What's old is new again ;)
where is CISSP ?
Need another tier list video soon I think! :D
Thanks Typer and Spenser for the tools. What do you think about Purple knight ?
PurpleKnight is also a great FREE tool. I'm a fan of it
Have recently subscribed to this channel, and really like the one-on-one chats between experts in their various fields. Especially when discussing some of the issues you see on jobs and where you see customers failing over and over, and how you would improve things from a Red and Blue Team perspective. Lots of useful things in these videos, so thank you and keep up the great work.
That truly means a lot to us. Thank you so much for the kind words. As long as yall are watching/listening and getting value we will keep the content coming. 💪🙏
Great content thank you for uploading!
Super appreciate that. Thanks so much!!
What note taking applications do you guys use? Do you have something different for building your report during a pentest vs something to use while studying/practicing pentesting? I've heard a lot of popular options like Obsidian and Notion but it'd be nice to hear the opinion of actual pen testers. This channel is an absolute gold mine BTW! Every episode has helped me tremendously as a new pentester/new to cyber, so thank you!
Wow thanks so much for the kind words! We really appreciate that. Some of us use obsidian, others use notepad++. It's really user preference. I'm a big fan of notepad++ myself. Kind of low-tech but it really has some nice features like regex support, diff, macros. As far as reporting, yeah we use a commercial platform that helps us convert findings into a nicely styled and formatted word/pdf document.
I seem to have been stuffed with tons of credentials. I have no idea how I got them, don't know if I'm using them, but I know they are there. I've looked at them... There are too many for me to look at all of them. should I be concerned?
Perhaps
Great episode! Looking forward to the flipper zero episode!!
Thank you!!
Ejpt sucks. The fact that it doesn’t have a renewal track means you constantly would have to take it every three years to renew. The pricing is fine but C for the horrible renewal. Even if you don’t get other certs you should have the ability to upgrade by taking a higher cert from them
That's fair. Many times renewal requirements come from external requirements such as DoD
Just an FYI, if you renew your SANs cert they provide you updated materials and lab files. I know the recert fee is expensive but not $9K (~$450) so I still hope this helps someone know they can get new materials. I agree it's be nice to know timing of new courses. They do show courses in beta I believe. "Your certification renewal includes an updated set of course books, audio files, and any relevant lab files." There are certain licenses and hardware it looks like which aren't included. You can request physical books or get the digital version.
Ok interesting, that's not how I understood it, I will have to go and look again, thank you
Did you guys' place CPTS in the same position as Pentest+? I think that is really unfair considering the amount of hands-on knowledge you need to pass the CPTS. CPTS really deserves to be on the A tier. That's just my opinion...
That's fair. We should really do another certification tier list video
Great stuff guys!
Thank you, appreciate that!!
Ejpt over Cpts... Ummm..
This was recorded when cpts first came out, we should make a new video!
COOL!
thanks!
I have the CPTS and it should definitely be S tier. But I can understand at the time this video was uploaded it might’ve not been known how great it is
this video was made when the cpts first came out. I think if I recorded it now I would agree
I’ve never done actual pentesting, I’ve only done Bug Bounties. But I would think in a pentest, the limited time is a big deficiency. The top bug bounty hunters that hack apps like Google or Yahoo have months of deep diving into the applications and they figure out unique ways to hack applications. Another issue with Pentesting is once you get RCE then I would think the motivation to find other bugs die down. You’ve already proved a big impact bug, so there’s no need to look for CSRF or XSS. But in Bug Bounty, each bugs makes you money so after finding an RCE, as a bug hunter, I would go deeper into finding as many bugs as I can. Because where there’s smoke there’s fire.
Great episode thanks for the upload
ty, appreciate you!
Awesome guide
thanks!
I think what makes OSCP A tier and not S tier is the training. Yes, it has the name recognition, but if you were to put one person through the PWK and another through TCM training, and don't bother with testing, the TCM student would perform better at the job.
That's fair, a lot has changed in the last 7 months too...
When I first heard this as a Podcast, I thought you were saying "Pink" Castle. Makes a lot more sense now!
I blame being from NY and talking fast. 😆glad the message finally got through though :)
Just started python, this episode hurts though.. not sure I could ever do all that on top of doing my CPST
Rome wasn’t built in a day. Take it slow. There’s no need to overwhelm yourself! You got this.
SANS is just a big rip off 😢
Aye!! Loved the podcast. Thank you gentleman for your insight. As a Security Operations Engineer trying to break into the pentesting field and holding eJPT, CRTP, PNTP, CRTO, and gunning for OSCP in 2024, I had a big, goofy smile on my face by the end of it. Darrius, how did the GCPN certification treat you? I just found this channel today, but I skimmed through the videos and didn't see a "I'm sorry, I messed up" post about it 😆Also CPTS seems to be taking the industry by storm now. I've heard nothing but great things about it recently to the point where I'm contemplating purchasing it after OSCP. It would be fantastic to get a firsthand review from your team if someone has the time to pursue it this year.
Hey, You have all the certs I am aiming for. I completed ejpt, going for pnpt. I wanted to go oscp after that.(maybe cpts after this) Would you recommend me to go for crto or crtp after oscp. Or should I skip them and go for gpen?
Hey! That sounds like a solid path. My recommendation would be based on what your goals are. For example, I took CRTP and CRTO to gain a more in-depth understanding of internal network penetration testing, red teaming, and Opsec (or in this context "how to be sneaky when performing engagements"). The knowledge gained in these certs has benefited me in my current role with hardening the systems I'm assigned to protect, but I'm also aiming to one day do exactly what Spencer does and conduct Assumed-Breach Internal Penetration tests. The CRTO and CRTP were a logical choice for me to make. Although they're red teaming certifications, they go into more detail on Active Directory attack vectors. Personally, I would only take GPEN if my company offered to pay for it, but it's not on my to-get list at this time for the same reasons discussed in this video. @@samxkaizen
@@ndog315 Thanks a lot Mate. Will definitely follow the path you recommended.Thankyou for the guidance.
I’ll let Darrius comment about GCPN if he would like. However, from my (Spencer) perspective and from what I’ve heard… CPTS is 1) more realistic and representative of the skills a pentester should have in 2024 and 2) it’s harder than OSCP, and 3) it’s not a 24 hour exam, you get much much longer which is great. You also have to complete the course material before you can even attempt the exam. Whereas with other certs you could just take the exam only if you wanted to. Overall I think CPTS is a strong contender. Lastly I will say, certs are not the only way to show competency. Blogs, videos, tutorials, social media content, talks at cons, research, etc. there’s so much more you can do now to show you know your stuff then stacking certifications. They are still valuable just less than we like to think they are.
Darrius here. Overall I’d say that the gcpn was decent. I ended up scoring above 90 on it. While the material is decent and probably great for beginners the lack of a practical portion for the exam keeps it at B or C tier. CPTS is definitely getting up there also.
Thanks for this. Noted for future certs. :)
Glad it was helpful!
Bro this will be helpful for my future certs. very informative based on real pen testers. please upload more videos like this, like HTB certs such as CBBH, CDSA
You’re so welcome. We will do another episode like this with other certs for sure!
www.securit360.com/threat-intel-newsletter/
so, fuzzing.
Essentially yea
Would love to see some more. Not too many great certs or clear paths for webapp pentesting got the cbbh and burpsuite practioner lined up but thats it
I’ve been noticing a handful of people in my feed getting OSWE. Maybe there’s value there I don’t know it personally that well
@@CyberThreatPOV Yeah, it's just costly and pretty damn advanced I believe
www.securit360.com/threat-intel-newsletter/
www.securit360.com/threat-intel-newsletter/
www.securit360.com/threat-intel-newsletter/
Learn how to prevent social engineering attacks -> ua-cam.com/video/rB5dkpqc1rU/v-deo.html
More cybersecurity hot takes here -> ua-cam.com/video/1mny7KF6oNE/v-deo.html
⚫ Weekly Threat Intel Newsletter securit360.com/threat-intel-newsletter/
⚫ Weekly Threat Intel Newsletter securit360.com/threat-intel-newsletter/
⚫ Weekly Threat Intel Newsletter securit360.com/threat-intel-newsletter/
⚫ Weekly Threat Intel Newsletter securit360.com/threat-intel-newsletter/
⚫ Weekly Threat Intel Newsletter - securit360.com/threat-intel-newsletter
Good to see @SamErde
Hi, Merill!
Good job guys !!!!❤