Women in Information Security: Carrie Roberts

Last time, I spoke to Katherine Teitler. She’s the director of content for MISTI Training Institute. She also helps run the InfoSec World conference. This time, I spoke with Carrie Roberts. She has a senior red team role with Walmart. She’s also a pretty good cartoonist if I say so myself. Kimberly Crawley: Tell me […]… Read More

The post Women in Information Security: Carrie Roberts appeared first on The State of Security.

The post Women in Information Security: Carrie Roberts appeared first on Security Boulevard.

Continue reading Women in Information Security: Carrie Roberts

DerbyCon 2017, Casey Smith and Keith McCammon’s ‘Blue Team Keeping Tempo with Offense’

Permalink

The post DerbyCon 2017, Casey Smith and Keith McCammon’s ‘Blue Team Keeping Tempo with Offense’ appeared first on Security Boulevard.

Continue reading DerbyCon 2017, Casey Smith and Keith McCammon’s ‘Blue Team Keeping Tempo with Offense’

Pivoting Tools Through Meterpreter – Tradecraft Security Weekly #16

There are a ton of modules in Metasploit that are extremely useful for performing various attacks post-exploitation. But sometimes there are external tools that you might want to use that are not included in Metasploit. It’s possible to proxy other external tools through a Meterpreter session using a module in Metasploit and proxychains. In this […]

The post Pivoting Tools Through Meterpreter – Tradecraft Security Weekly #16 appeared first on Security Weekly.

Continue reading Pivoting Tools Through Meterpreter – Tradecraft Security Weekly #16

OSINT & External Recon Pt. 1: Host Discovery – Tradecraft Security Weekly #8

During the reconnaissance phase of a penetration test being able to discover the external assets of an organization is extremely important. It is also important to do so as stealthily as possible. Using open-source techniques and tools it is possible to enumerate an organizations external assets without sending any data directly from your computer system […] Continue reading OSINT & External Recon Pt. 1: Host Discovery – Tradecraft Security Weekly #8

OPSEC Considerations for Beacon Commands

A good operator knows their tools and has an idea of how the tool is accomplishing its objectives on their behalf. This blog post surveys Beacons commands and provides background on which commands inject into remote processes, which commands spawn jobs, and which commands rely on cmd.exe or powershell.exe. API-only These commands are built-into Beacon […] Continue reading OPSEC Considerations for Beacon Commands

Situational Awareness with HostRecon – Tradecraft Security Weekly #7

After exploiting a system on a remote & unfamiliar network it is extremely important to gain situational awareness as quickly, and quietly as possible. This will help ensure success moving forward with other attacks. In this episode of Tradecraft Security Weekly Beau Bullock (@dafthack) will show how to use PowerShell to query information about the […] Continue reading Situational Awareness with HostRecon – Tradecraft Security Weekly #7

Inside the NSA’s CDX, a high-tech competition pitting cadets against elite attackers

Professional hackers from the NSA, U.S. Cyber Command and foreign militaries are launching a barrage of simulated cyberattacks this week as part of a training exercise to help teach students at the service academies for the Navy, Army, Coast Guard, U.S. Merchant Marine and Canadian Royal Military how to better defend sensitive computer networks. The annual NSA-led event, named the Cybersecurity Defense Exercise, or CDX, brings together rising talent with seasoned cyber-warriors in a simulated war games environment, where the undergraduates must monitor, identify and ultimately defend against a wide array of remote computer intrusions. The intrusions themselves are engineered with open-source, commercially available exploits and other hacking tools. “We don’t use anything homegrown,” said CDX Technical Lead James Titcomb, a full-time NSA employee in the spy agency’s information assurance directorate. “We don’t hit them with anything on the level of a nation-state,” Titcomb said. “The idea is that they should […]

The post Inside the NSA’s CDX, a high-tech competition pitting cadets against elite attackers appeared first on Cyberscoop.

Continue reading Inside the NSA’s CDX, a high-tech competition pitting cadets against elite attackers