PowerBI Data Analyst - Create visualizations and dashboards from scratch
Google, IBM & Meta Certificates — Less Than ₹22/Day
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore red teaming gaps and musings in this 27-minute conference talk by Samuel Sayen at Derbycon 2018. Delve into various aspects of red teaming, including definitions, limiting factors, and scope constraints. Learn about notable hacks like the Phineas Phisher and Yahoo incidents, and examine the challenges posed by scope restrictions. Discover strategies to overcome imaginary scope restraints, replicate hardware compromises, and leverage cloud resources. Gain insights into the current status quo of red teaming and explore Mandiant's offensive tools and scripts in the appendix.
Syllabus
Intro
BIO/Background
Definitions
Limiting Factors
No Time Constraint - Phineas Phisher Hack
No Tool/Infrastructure Restraints - No Easy Breach
No Scope Constraint - Yahoo hack
Scope Constraints (continued)
99 problems, but a scope ain't one.
24 Port Elephant in the Room
Holy crap.... Another Oct 4th headline
Overcome Imaginary Scope Restraints
Loosely Replicate Hardware Compromises
Abuse the Cloud
My take on current status quo for RT'ing
Appendix: Mandiant Tools/Scripts (offensive)