A Needle in a Haystack: How to Find a Threat Hidden in Over 6 Billion Logs Per Day – Brian Davis This video features Brian Davis from Red Canary discussing their approach to detecting security threats within the massive volume of cloud environment logs. He explains their six-stage pipeline: Ingest, Standardize, Combine, Detect, Suppress, and Read More …
Author: tmack
Hacker TV – GoFetch
This video demonstrates how GoFetch utilizes Bloodhound attack graph data to automatically pivot from an exploited host to the domain controller.ย ย The demonstration begins in Bloodhound, where the presenter identifies the attack path to the domain controller. After finding a path, the graph is exported for use by the attack script. The presenter then launches GoFetch Read More …
smbclient test for 445
Whileย smbclientย is primarily used for interacting with SMB shares (like listing shares or accessing files),, it can implicitly indicate if port 445 is open and accessible. Ifย smbclientย can successfully connect to an SMB share on a target system, it means port 445 is open on that system and allowing connections. How it works: When you use smbclient Read More …
FCS – Frame Check Sequence
A Frame Check Sequence (FCS) is an essential component in data communication protocols, serving as a method for error detection. It is a sequence of bits added to the end of a data frame, which allows the receiving device to verify the integrity of the data it has received. Understanding FCS is crucial for new Read More …
Conference Video – Why We are Not Building a Defendable Internet
Black Hat Keynote: Why We are Not Building a Defendable Internet
Notes :: Kubernetes
ย Key topics include: Traditional vs. Kubernetes Challenges:ย Comparing the challenges of managing applications in traditional virtual machine environments versus containerized Kubernetes environments. Kubernetes Fundamentals:ย Defining Kubernetes, its origins, why it’s used, and key concepts like cluster architecture, API server, nodes, pods, and network policies. Kubernetes Security Fundamentals:ย Discussing control plane and data plane protection, including API protection, encryption, Read More …
Hacker TV – The Future of Technology at Microsoft
Satya Nadella – The Future of Technology at Microsoft
LCP – Link Control Protocol
The Link Control Protocol (LCP) is a critical component of the Point-to-Point Protocol (PPP), which is widely used for establishing direct connections between two network nodes. LCP plays a vital role in the setup, configuration, and management of PPP connections, making it essential for ensuring reliable and efficient data transmission over point-to-point links. Establishing Connections Read More …
Conference Video – Reusing Adversary Tradecraft
Super Bad06 RAT Reusing Adversary Tradecraft Alexander Rymdeko Harvey
Hacker TV – All Your Devices Can Be Hacked
Avi Rubin is Professor of Computer Science at Johns Hopkins University and Technical Director of the JHU Information Security Institute. Avi’s primary research area is Computer Security, and his latest research focuses on security for electronic medical records. Avi is credited for bringing to light vulnerabilities in electronic voting machines. In 2006 he published a Read More …