- 411
- 253 649
Antisyphon Training
United States
Приєднався 25 кві 2022
Antisyphon Training is here to disrupt the traditional information security training industry by providing high-quality and cutting-edge education to everyone, regardless of their financial position. We offer students community-driven opportunities to learn skills, practice in hands-on labs, CTF challenges, and engage with their community in a fun and inclusive way.
Visit us at www.antisyphontraining.com
Join us for live virtual trainings, Live Pay-What-You-Can trainings, or learn at your own pace with our On-Demand catalog.
Don't miss our free weekly "ANTI-Cast" webcasts, live here on UA-cam, or join us on Zoom by registering at poweredbybhis.com
Antisyphon Training is powered by BHIS.
Visit us at www.antisyphontraining.com
Join us for live virtual trainings, Live Pay-What-You-Can trainings, or learn at your own pace with our On-Demand catalog.
Don't miss our free weekly "ANTI-Cast" webcasts, live here on UA-cam, or join us on Zoom by registering at poweredbybhis.com
Antisyphon Training is powered by BHIS.
Secure Code Summit | Closing Panel Discussion
00:00 - Welcome!
00:06 - Zach H. - Are bug bounty programs effective?
01:09 - John S. - Bug bounty VS full product analysis - use issue tracker for 3rd party code, libraries
02:29 - Zach H. - Bug bounties VS full-time analyst. Community-based.
03:15 - Jordan D. - Always digging through code
03:45 - John S. - Bounty hunters look for more universal generic bugs
04:46 - Chris T. - Agree, example Log4Shell - write an identifier script to save work
05:29 - John S. - Customers need to know enough to ask for what they need
06:51 - Zach H. - How can the community be more helpful?
07:23 - Chris T. - Add security points to non-security-focused discussions
08:52 - Amiran A. - Expand focus to include systemic issues
10:16 - John S. - Legacy code obstacles, moving to a SAAS model
15:10 - Jordan D. - Revenue is priority
16:06 - Chris T. - Difficulties transitioning from flash/legacy code in general
17:56 - John S. - Legacy code in the cloud
19:38 - Jordan D. - Elastic Map Reduce issues
20:32 - John S. - Some languages allow crappy but functional code to look like good code
21:26 - Tim F. - Pressure to code fast - skip over learning process
24:43 - Chris T. - Scrum masters and minimum viable product
26:09 - Zach H. - Is Secure by Design a viable option? No.
26:44 - Jordan D. - Accountability problem
27:16 - Chris T. - Fines are ineffective
28:10 - John S. - CISA pledge and checklist mentality. Infosec is fun!
29:47 - Zach H. - Do you ever see an organization with proper security?
29:54 - John S. - Yes. Honey Badger Award - Our job is to make our job more difficult
31:26 - Chris T. - Organizations recognize quality after getting burned
32:25 - Zach H. - If pentesters don’t find vulns, how do you know it’s a quality test?
32:49 - John S. - Confidence comes with experience
33:19 - Jordan D. - No findings means dig deeper, developing new tools
33:32 - Chris T. - Crowdsource if you get stuck
34:08 - John S. - New class of cards for competitive Backdoors and Breaches is being tested
/// 📄 View our Pay-What-You-Can Courses
www.antisyphontraining.com/pay-what-you-can/
/// 📄 View the Antisyphon Course Catalog
www.antisyphontraining.com/course-catalog/
/// 📄 View Our Live Training Course Calendar
www.antisyphontraining.com/training-calendar/
/// 📄 Antisyphon Training Roadmap
www.antisyphontraining.com/training-roadmap/
///Antisyphon Socials
Twitter: Antisy_Training
Mastodon: infosec.exchange/@Antisy_Training
LinkedIn: www.linkedin.com/company/antisyphon-training
Discord: discord.gg/ffzdt3WUDe
///Antisyphon Training
Pay What You Can: www.antisyphontraining.com/pay-what-you-can/
Live Training: www.antisyphontraining.com/training-calendar/
On Demand Training: www.antisyphontraining.com/on-demand-courses/
///Antisyphon Shirts
spearphish-general-store.myshopify.com/collections/antisyphon-training
///Educational Infosec Content
Black Hills Infosec UA-cam: ua-cam.com/users/blackhillsinformationsecurity
Black Hills Infosec Blogs: www.blackhillsinfosec.com/blog/
Wild West Hackin' Fest UA-cam: ua-cam.com/users/wildwesthackinfest
Active Countermeasures UA-cam: ua-cam.com/users/activecountermeasures
///Backdoors & Breaches - Incident Response Card Game
Backdoors & Breaches: www.backdoorsandbreaches.com/
Play B&B Online: play.backdoorsandbreaches.com
Join us at the annual information security conference in Deadwood, SD (in-person and virtually) - Wild West Hackin' Fest: wildwesthackinfest.com/
#bhis #antisyphon #infosec #CyberSecurity #training
00:06 - Zach H. - Are bug bounty programs effective?
01:09 - John S. - Bug bounty VS full product analysis - use issue tracker for 3rd party code, libraries
02:29 - Zach H. - Bug bounties VS full-time analyst. Community-based.
03:15 - Jordan D. - Always digging through code
03:45 - John S. - Bounty hunters look for more universal generic bugs
04:46 - Chris T. - Agree, example Log4Shell - write an identifier script to save work
05:29 - John S. - Customers need to know enough to ask for what they need
06:51 - Zach H. - How can the community be more helpful?
07:23 - Chris T. - Add security points to non-security-focused discussions
08:52 - Amiran A. - Expand focus to include systemic issues
10:16 - John S. - Legacy code obstacles, moving to a SAAS model
15:10 - Jordan D. - Revenue is priority
16:06 - Chris T. - Difficulties transitioning from flash/legacy code in general
17:56 - John S. - Legacy code in the cloud
19:38 - Jordan D. - Elastic Map Reduce issues
20:32 - John S. - Some languages allow crappy but functional code to look like good code
21:26 - Tim F. - Pressure to code fast - skip over learning process
24:43 - Chris T. - Scrum masters and minimum viable product
26:09 - Zach H. - Is Secure by Design a viable option? No.
26:44 - Jordan D. - Accountability problem
27:16 - Chris T. - Fines are ineffective
28:10 - John S. - CISA pledge and checklist mentality. Infosec is fun!
29:47 - Zach H. - Do you ever see an organization with proper security?
29:54 - John S. - Yes. Honey Badger Award - Our job is to make our job more difficult
31:26 - Chris T. - Organizations recognize quality after getting burned
32:25 - Zach H. - If pentesters don’t find vulns, how do you know it’s a quality test?
32:49 - John S. - Confidence comes with experience
33:19 - Jordan D. - No findings means dig deeper, developing new tools
33:32 - Chris T. - Crowdsource if you get stuck
34:08 - John S. - New class of cards for competitive Backdoors and Breaches is being tested
/// 📄 View our Pay-What-You-Can Courses
www.antisyphontraining.com/pay-what-you-can/
/// 📄 View the Antisyphon Course Catalog
www.antisyphontraining.com/course-catalog/
/// 📄 View Our Live Training Course Calendar
www.antisyphontraining.com/training-calendar/
/// 📄 Antisyphon Training Roadmap
www.antisyphontraining.com/training-roadmap/
///Antisyphon Socials
Twitter: Antisy_Training
Mastodon: infosec.exchange/@Antisy_Training
LinkedIn: www.linkedin.com/company/antisyphon-training
Discord: discord.gg/ffzdt3WUDe
///Antisyphon Training
Pay What You Can: www.antisyphontraining.com/pay-what-you-can/
Live Training: www.antisyphontraining.com/training-calendar/
On Demand Training: www.antisyphontraining.com/on-demand-courses/
///Antisyphon Shirts
spearphish-general-store.myshopify.com/collections/antisyphon-training
///Educational Infosec Content
Black Hills Infosec UA-cam: ua-cam.com/users/blackhillsinformationsecurity
Black Hills Infosec Blogs: www.blackhillsinfosec.com/blog/
Wild West Hackin' Fest UA-cam: ua-cam.com/users/wildwesthackinfest
Active Countermeasures UA-cam: ua-cam.com/users/activecountermeasures
///Backdoors & Breaches - Incident Response Card Game
Backdoors & Breaches: www.backdoorsandbreaches.com/
Play B&B Online: play.backdoorsandbreaches.com
Join us at the annual information security conference in Deadwood, SD (in-person and virtually) - Wild West Hackin' Fest: wildwesthackinfest.com/
#bhis #antisyphon #infosec #CyberSecurity #training
Переглядів: 86
Відео
Rainbow Connection - Linking Security Testing with Development | Kevin Johnson
Переглядів 8628 днів тому
00:00 - Welcome! 00:36 - Intro - Infosec is often completely separated from development 00:56 - Speaker Bio 03:34 - Agenda 04:32 - Current state - Infosec and developers don’t mix 05:36 - No bidirectional communication or synergy 06:10 - Pen test findings not addressed - didn’t understand the problem or narrow focus 07:43 - Security teams come from a network background 09:29 - Why developers le...
Secure Code Summit | PreShow Banter Panel Discussion
Переглядів 7028 днів тому
00:00 - Welcome! 00:19 - Zach Hill - What does Secure Code mean to you? 01:19 - Tim Fowler - Doing it right vs business objectives 03:28 - John Strand - Legacy code problem - continuous process 05:31 - John Strand - Coding language implications 07:39 - Chris Traynor - Schools did not emphasize secure code 08:57 - John Strand - Fewer buffer overflows, more application interoperability issues 10:...
Containers Uncontained: Docker Security Mistakes I Made So You Don’t Have To | Amiran Alavidze
Переглядів 14428 днів тому
00:00 - Welcome! 00:12 - Mental model of a container 02:04 - Docker and networking 02:44 - DEMO: Networking 04:23 - Port mapping misconfiguration in Docker Compose files 05:35 - DEMO: Port mapping misconfiguration 06:13 - DEMO: Docker containers sharing same network 06:34 - Every stack that you deploy to Docker gets its own virtual network by default 06:56 - Securing Docker networks 07:59 - Pro...
Will developers become extinct? The Impact of AI on the Software Security Industry | Matias Madou
Переглядів 12828 днів тому
00:00 - Welcome! 01:24 - What will the AI / Human work force look like? 03:13 - Software devs will be replaced with software devs that know how to leverage AI 03:38 - Afraid that AI will take your job? (poll) Use Chat GPT to get familiar. 04:27 - Human brain is a neural network like generative AI 05:46 - How NN is inferior to human brain 08:48 - AI and AppSec - capabilities 12:27 - AI and the s...
Commitment Issues: The Yellow Brick Road to Secure Code | Jordan Mussman
Переглядів 8328 днів тому
00:00 - Welcome! 00:58 - Jordan's Bio 01:30 - Why you should care about secure code 02:34 - Insecure code examples, detection methods 05:09 - Secure Code Definition 05:58 - Case studies (composite) 07:21 - Case Study 1: Poor user input sanitization 10:33 - Case Study 2: Developer instance open to the internet 16:11 - Case Study 3: Easily-reversed application 20:35 - Lessons learned 28:40 - Q: B...
Hidden Vulnerabilities in “Secure” Code and Why You Need SAST | Roman Bohuk
Переглядів 17328 днів тому
00:00 - Welcome! 00:11 - Writing code for CTFs (secure and intentionally insecure) 00:43 - Agenda 00:57 - Example: vulnerable nodejs application 02:12 - Example: php 03:25 - Example: python 04:54 - Example: C 06:25 - Example: php password strcmp 09:06 - Example: python yaml configuration 10:19 - Why secure coding is hard 11:35 - Solutions? 12:49 - Why use SAST? 13:48 - Static Application Secure...
Home Labs: Attack and Defend Your DFIR Lab w/ Markus Schober (Patched Update) #homelab #DFIR
Переглядів 1,2 тис.3 місяці тому
Home Labs: Attack and Defend Your DFIR Lab w/ Markus Schober (Patched Update) #homelab #DFIR
SOC Core Skills w/d John Strand | August 2024 Day 4 - The Patched Update
Переглядів 1,3 тис.4 місяці тому
SOC Core Skills w/d John Strand | August 2024 Day 4 - The Patched Update
What's in the Box?? | I.R. Summit 2024
Переглядів 2145 місяців тому
What's in the Box?? | I.R. Summit 2024
Dumpster Fires: 3 things about IR I learned by being a firefighter | I.R. Summit 2024
Переглядів 1475 місяців тому
Dumpster Fires: 3 things about IR I learned by being a firefighter | I.R. Summit 2024
The Million Dollar CEO Fraud Anatomy of a Business Email Compromise | I.R. Summit 2024
Переглядів 2765 місяців тому
The Million Dollar CEO Fraud Anatomy of a Business Email Compromise | I.R. Summit 2024
Navigating the Shadows: Incident Response in the Age of Dark Web Tactics | I.R. Summit 2024
Переглядів 3615 місяців тому
Navigating the Shadows: Incident Response in the Age of Dark Web Tactics | I.R. Summit 2024
Demystifying AWS Incident Response: A Practical Perspective | I.R. Summit 2024
Переглядів 3635 місяців тому
Demystifying AWS Incident Response: A Practical Perspective | I.R. Summit 2024
Dungeons & Dragons: The security tool you didn’t know you needed | I.R. Summit 2024
Переглядів 4225 місяців тому
Dungeons & Dragons: The security tool you didn’t know you needed | I.R. Summit 2024
Incident Response as a Recovering Pentester | I.R. Summit 2024
Переглядів 3085 місяців тому
Incident Response as a Recovering Pentester | I.R. Summit 2024
How I started my summer vacation: Navigating My First Incident in the Cloud | I.R. Summit 2024
Переглядів 2035 місяців тому
How I started my summer vacation: Navigating My First Incident in the Cloud | I.R. Summit 2024
Where Do We Begin? - Panel Discussion | I.R. Summit 2024
Переглядів 4505 місяців тому
Where Do We Begin? - Panel Discussion | I.R. Summit 2024
Get an Epic Cyber Education for Free! (Almost!) With Carrie Roberts
Переглядів 1,7 тис.6 місяців тому
Get an Epic Cyber Education for Free! (Almost!) With Carrie Roberts
Incident Response CTF Competition - June 19th, 2024
Переглядів 1,1 тис.6 місяців тому
Incident Response CTF Competition - June 19th, 2024
60min Crash Course into Infosec w/ Bill McCauley
Переглядів 4507 місяців тому
60min Crash Course into Infosec w/ Bill McCauley
In Cloud We Trust: Common M365 Attack Techniques to Bypass Defenses
Переглядів 6899 місяців тому
In Cloud We Trust: Common M365 Attack Techniques to Bypass Defenses
How to Job Hunt Like a Hacker - OSINT EDITION
Переглядів 2,8 тис.9 місяців тому
How to Job Hunt Like a Hacker - OSINT EDITION
Less but Better: Lessons Learned From Red Teaming Esoteric Environments
Переглядів 2399 місяців тому
Less but Better: Lessons Learned From Red Teaming Esoteric Environments
How to annoy your colleagues, lose friends and throw away your social life Bypassing EDRs
Переглядів 4029 місяців тому
How to annoy your colleagues, lose friends and throw away your social life Bypassing EDRs
Bypass Like It's 1999: Decades of Fraggles, Doozers, and Desync
Переглядів 1379 місяців тому
Bypass Like It's 1999: Decades of Fraggles, Doozers, and Desync
Evasive Facility Breach: From Ingress to Egress in 15 Minutes or Less
Переглядів 1709 місяців тому
Evasive Facility Breach: From Ingress to Egress in 15 Minutes or Less
DO WE HAVE TO START WITH PACK DECODING IF WERE COMPLETE BEGINNER ??
Thank you
Thanks for an engaging & informative talk, Amanda! One of the things that I found was missing from my University's curriculum was an explanation of what actually happens on the ground during an incident. We discussed all the theory, but what I really wanted was to be a "fly on the wall" during the response. Your story was exactly what I was hoping for. Thanks for filling in the gaps!
Thank you.
Thank you.
Beautiful stuff, thanks a million!
Thank you Amanda Berlin and the whole Antisyphon Team for all of the contributions all across the board. You are appreciated! 🙌
Will this stop it in interactive sessions only?
Thank you very much John for sharing these valuable info...its greatly helpful for us
Thank you for sharing. What are your thoughts on running docker rootless on a server to manage multiple WP instances? After the vid it seems to be not the best idea… Thank you.
agreed live is much more fun! missed today but i'll be there tomorrow!
Thank you!
Thank BHIS. You guys are all amazing
the comic is incredible. i was thoroughly entertained. it was fun to read and go through, I'm looking forward to the rest. this is just brilliance period - this training, so many gems. thank you!
❤❤❤
Rollin rollin rollin cmon!
Perfect!!
Legendary! 🎉
Awesome video thank you so much
Thank you!
Thank you so much for your time Tim, wonderful workshop with great information and resources. Absolute gold, thank you!
If you lack confidence do this toblion hierarchy, they will respond
14:00 I found that on LinkedIn you get more chance of being accepted if you somehow have other connections, like connect with lion people, specially CEOs
Thanks Tim! Just super amazing
Thank you for posting this. Getting up at 3 am was NOT gonna happen during the weekday. 🖖
John Strand is for me a legend, I could listen to this guy for days even if he's narrating a pancake recipe. I really like that he brings wisdom and intelligence in everything he talks about.
I wish would've known about this before.
YO THIS IS SICKKKKKK. THANK YOU BHIS
This this this!!!
I missed the first session😭😥 Thank you for the recap🙏❤
How can we get the links for this webcast?
👌
Thanks antisyphon team 🎉💯
She forgot to mention that HTB is way more expensive than THM, but the quality and the effort that the HTB team put in to their platform is unmatched.
oh no... where is the full video? i cant find it anymore :(
This is the full video for day 1. You can find all the videos for this class in this playlist: ua-cam.com/play/PL-4fuTjKox5ejObDUUr71hNZ84mf0lqJn.html
So if I did PNPT to OSCP, that'd be wise?
yeah you can do it.
You did a great job breaking down the subject matter. I would be totally on board if you decided to do a deeper dive on the platform. Thank you so much for taking the time to put this on :)
Great explanations! Thank!
I just got my GCC certification, how would this help me?
Thanks for these tutorials 🙏
Brilliant Thank you Anticyphone
Straight to the point I like it
Great resource , leaned so much about the intricacies of AD here. Please make the demos available here too
suprb !!!
Great training!🙂
Thank you Dale for your time👍
This is so unbelievably awesome!! Have been watching Simply Cyber for a while and Gerry has talked a lot about this service, and trying it now, Its so amazing! I cant believe this is free
Heartfelt thanks to Antisyphon team and it's sponsors for offering this free training. I deeply appreciate all your hard work and dedication in teaching and helping others to truly impact the industry.