Active Countermeasures Webcasts
Recordings of our live online public webcasts.
Testing Your Threat Hunt Platform
Because Threat Hunting is such a new discipline, it's not always clear what Threats a particular package can detect. In this webcast, Bill Stearns and Keith Chew will walk you through testing your Threat Hunting software to make sure it is working properly and can detect different types of unwanted traffic...
How to Build a Home Lab
We’re going to cover how to set up a Home Lab – an isolated environment where you can test new hardware, programs, and applications. By keeping this totally separate from everything else, you get free rein to play without risk to your other systems – and without risk of breaking any company policies!
Sniffing Traffic in Amazon EC2 with Traffic Mirroring
Amazon EC2 is a great solution for quickly spinning up virtual machines. The only downside is that we lose our ability to leverage network-based security tools that rely on decoding the packet stream, like traffic monitors and intrusion detection systems. Luckily, that no longer needs to be a thing.
How to Use a Raspberry Pi as a Network Sensor
Running a network sensor, IDS, or IPS can be a costly venture; the high-end ones can cost more than a used car. In this webcast, we’ll cover running a network sensor using a Raspberry Pi, a miniature single-board computer that runs most anything you can run under Linux
Network Decoding Command and Control Channels
In this webcast, we do a deep dive on the network communications of multiple command and control tools. We start with a pcap analysis (Wireshark, woot!) and work our way through open source and commercial tools that can help simplify the process.
Attack Tactics: Part 4
For this next installment of the Attack Tactics series, John looks at cloud security defenses. In the previous webcast, we covered the tools Black Hills Information Security (our sister company) uses to attack cloud-based two-factor authentication and turn cloud services against each other for password spraying.
Attack Tactics: Part 2
This is the second part of John’s series about Attack Tactics. In the first part we discussed how we’d attack. Now, we cover the same attack, but this time we are covering the defensive components the organization could have implemented to stop us every step of the way.