Python, Prompt Engineering, Data Science — Build the Skills Employers Want Now
Finance Certifications Goldman Sachs & Amazon Teams Trust
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Discover simple yet effective red teaming techniques in this conference talk from NorthSec. Learn how to improve USB key drop success rates, reduce command and control discoverability, leverage Outlook for social engineering, and implement other easy hacks that can significantly impact assessment outcomes. Explore topics such as movie-inspired USB key tactics, Milgram experiments, RSA token exploitation, email tricks, magnetic viewing film usage, blueprint acquisition, employee manipulation, command and control hosting, OCR exfiltration, encrypted file handling, USB key bypass methods, spoofing techniques, and automated service exploitation. Gain confidence in conducting red team engagements and be inspired to build upon these practical strategies for enhancing your cybersecurity assessment skills.
Syllabus
Introduction
USB Key Drop
Movies
USB Keys
Milgram
RSA Tokens
Stupid Email Tricks
Oh a B
Wait for files
Magnetic viewing film
Getting blueprints
Employees That Buy
Command Control
Host CNC
Gupt
OCR
Exfiltration
Encrypted Files
USB Key Bypass
Generalization
How to spoof
Automated taxi services
Automated energy providers
Rubber Duckies
App Tiny 85
Wireless Keys
Taught by
NorthSec