- Видео 148
- Просмотров 26 340
CyberThreatPOV
США
Добавлен 21 апр 2022
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics.
Episode 114: Making Penetration Test Results Actionable
In this episode of The Cyber Threat Perspective, Spencer and Brad discuss the crucial steps to make penetration test results actionable. Learn how to turn findings into improvements for a stronger security posture.
- Prioritizing and addressing pen test findings amidst limited resources
- Strategies for efficient remediation and resource allocation
- The impact of timing and the “Q4 rush” on pen test effectiveness
- Bridging the expertise gap with training and strategic hiring
- Turning compliance-driven pen tests into genuine risk management opportunities
- Prioritizing and addressing pen test findings amidst limited resources
- Strategies for efficient remediation and resource allocation
- The impact of timing and the “Q4 rush” on pen test effectiveness
- Bridging the expertise gap with training and strategic hiring
- Turning compliance-driven pen tests into genuine risk management opportunities
Просмотров: 45
Видео
Episode 113: Phishing with Malicious RDP Files
Просмотров 106День назад
Join Brad and Spencer from SecurIT360 as they dive into the latest phishing techniques involving malicious RDP files. Stay informed on how to protect your organization from these sophisticated cyber threats. - Introduction to Midnight Blizzard (APT 29) and their new phishing tactics - Explanation of RDP files and their capabilities - Analysis of how RDP files are manipulated and used in attacks...
Episode 112: Key Insights From The Microsoft Digital Defense Report 2024
Просмотров 6414 дней назад
Get the essential takeaways from the Microsoft Digital Defense Report 2024 in this episode. Brad and Spencer discuss the latest cybersecurity trends, threats, and actionable insights for your organization. - The necessity of active monitoring and the benefits of third-party solutions. - The importance of understanding and analyzing attack paths. - Crucial statistics and implications from penetr...
Episode 111: Red Team Tools OST Managing Open-Source Threats
Просмотров 67Месяц назад
Join Brad and Spencer from SecurIT 360 as they dive into the complexities and ethical dilemmas surrounding red team tools in cybersecurity. In this episode, they dissect the latest research and discuss the dual-use nature of offensive security tools. - Ambiguity and confusion in offensive security terminology. - Differences between threat emulation and simulation. - Ethical concerns about the d...
Silent But Deadly The Stinky Truth About Active Directory Permissions
Просмотров 155Месяц назад
Silent But Deadly The Stinky Truth About Active Directory Permissions
Episode 110:AD Security Workshop Preview
Просмотров 84Месяц назад
Join Brad and Spencer from SecurIT 360's Offensive Security Group as they preview an upcoming conference workshop on Active Directory (AD) Security. Discover practical insights and hands-on techniques for hardening your AD environment against cyberattacks. - Overview of the SecureCarolina's CyberSC conference workshop. - Common misconfigurations in AD and how to fix them. - Importance of passwo...
Episode 109: Current State of Pentesting - Internal and External
Просмотров 77Месяц назад
Join us for Episode 109 of "The Cyber Threat Perspective" where Spencer and Tyler dive into the current state of penetration testing. From client engagements to the latest trends in the industry, we've got you covered! - Challenges in pen testing, including time constraints and missed findings. - Communication and collaboration strategies during client engagements. - Key trends and issues in cl...
Episode 108: New tales from the trenches!
Просмотров 462 месяца назад
Welcome to Episode 108 of The Cyber Threat Perspective! Join Tyler and Brad as they dive into the latest behind-the-scenes tales from their penetration testing adventures. - Authenticated vs Unauthenticated web application testing methodologies. - Risks and exploits tied to user enumeration and public information scraping. - Critical insights on securing identities in a Zero Trust environment. ...
Episode 107: How To Defend Against Lateral Movement
Просмотров 2872 месяца назад
Protect your network from lateral movement attacks! In this episode, Brad and Spencer from SecurIT360's offensive security group share essential tips and strategies. - Definition and importance of lateral movement in ransomware attacks. - Containment strategies like network segmentation and firewalls. - Legitimate yet risky tools like RDP and remote access software. - Key targets and initial ac...
Episode 106: An Overview of Cyber Risk
Просмотров 282 месяца назад
Let's talk about cyber risk classification in this episode of The Cyber Threat Perspective. Brad and Tyler provide a high-level overview of various types of cyber risk encountered in penetration testing. -Reputational Risk -Financial Risk -Operational Risk -Direct Risk -Indirect Risk -Lateral Risk -Strategic Risk -Compliance Risk offsec.blog
Episode 105: How To Monitor Your Attack Surface
Просмотров 762 месяца назад
Unlock the secrets of effective attack surface monitoring in this episode of The Cyber Threat Perspective. Brad and Spencer dive into essential practices, tools, and methodologies to keep your systems secure. - Define and understand attack surface and attack vectors - Distinguish between physical and digital attack surfaces - Explore DIY vs. commercial tools for attack surface monitoring - Lear...
Episode 104: How To Get Into Cyber For First Responders
Просмотров 523 месяца назад
Join us in this episode as we talk with Sam Killingsworth, a pen tester and career firefighter paramedic, about transitioning into a cybersecurity career. Discover practical advice and insights for first responders interested in making a similar move. - Learning Linux and obtaining the Security certification - Hands-on experience and the importance of self-teaching - Valuable resources like RUc...
Episode 103: Email Spoofing
Просмотров 9513 месяца назад
In this episode, Brad and Spencer dive into the mechanics and recent developments of email spoofing, shedding light on how attackers are bypassing advanced email protections. In this episode, we cover: - The fundamentals of email spoofing and why it's a significant threat. - Insight into the recent echo spoofing campaign exploiting Proofpoint's misconfiguration. - The role of SPF, DKIM, and DMA...
Episode 102: The Global CrowdStrike Outage
Просмотров 963 месяца назад
In this episode of The Cyber Threat Perspective, we dive into the recent global CrowdStrike outage and its far-reaching implications. Join us as we break down the key factors, responses, and insights from industry experts. - BitLocker key security and the need for postmortem evaluations. - Compliance issues and Microsoft's halted development due to EU regulations. - Challenges and impacts of re...
Episode 101: Infostealers - 10,000 Victims a Day
Просмотров 923 месяца назад
In this episode of "The Cyber Threat Perspective," hosts Spencer and Brad dive into the intricate world of InfoStealer malware, which affects 10,000 victims daily. Learn how these cyber threats operate and the strategies behind their success. - How cultural events and current affairs are exploited to spread malware. - The roles of log cloud operators, URL log pass resellers, and automated marke...
Episode 100: The OpenSSH RegreSSHion Vulnerability
Просмотров 834 месяца назад
Episode 100: The OpenSSH RegreSSHion Vulnerability
Episode 99: ToolTime - OneDriveEnum and AD Miner
Просмотров 1674 месяца назад
Episode 99: ToolTime - OneDriveEnum and AD Miner
Episode 98: Current State of M365 Attacks: Initial Access
Просмотров 1124 месяца назад
Episode 98: Current State of M365 Attacks: Initial Access
Episode 97: Current State of M365 Attacks: Enumeration
Просмотров 2144 месяца назад
Episode 97: Current State of M365 Attacks: Enumeration
Episode 96: How to Harden Active Directory to Prevent Cyber Attacks
Просмотров 2 тыс.5 месяцев назад
Episode 96: How to Harden Active Directory to Prevent Cyber Attacks
Episode 95: Navigating the Legal Maze of Cybersecurity with Alexander Boyd
Просмотров 515 месяцев назад
Episode 95: Navigating the Legal Maze of Cybersecurity with Alexander Boyd
Episode 94: Defending Against Ransomware Part 2
Просмотров 525 месяцев назад
Episode 94: Defending Against Ransomware Part 2
Episode 93: Defending Against Ransomware Part 1
Просмотров 875 месяцев назад
Episode 93: Defending Against Ransomware Part 1
Episode 92: Cybersecurity Training and Certification Advice
Просмотров 956 месяцев назад
Episode 92: Cybersecurity Training and Certification Advice
Episode 91: 2024 Verizon Data Breach Investigations Report
Просмотров 1336 месяцев назад
Episode 91: 2024 Verizon Data Breach Investigations Report
Episode 90: Insights from Coaching a Collegiate Cyber Defense Team
Просмотров 406 месяцев назад
Episode 90: Insights from Coaching a Collegiate Cyber Defense Team
Episode 89: How To Actually Protect Credentials
Просмотров 476 месяцев назад
Episode 89: How To Actually Protect Credentials
Episode 88: Budgeting for Security: Optimizing Penetration Testing Investments
Просмотров 357 месяцев назад
Episode 88: Budgeting for Security: Optimizing Penetration Testing Investments
Will this content ever be available on-demand? If you guys put out a course, I'd happily pay for it
My dads friend works with sam as a part time firefighter and recommended this video. Was great thanks! I am getting my Masters in Cybersecurity Analytics and looking at starting the HackTheBox CPTS certification training path this month since the OSCP is so expensive.
Thanks Spencer for another amazing and educational video!
Please provide a link to the courses or workshops.
Thanks team, enjoy your insights 👍
So welcome thank you for the comment!
It's nice seeing content that goes beyond 'how to break into infosec' and actually helps us on the front lines slapping the keyboard and working with stakeholders. Not that I am some grizzled vet, just saying I appreciate the deeper content.
That means a lot @Jesse_Johnson, thank you!
As someone who follows chess and CyberThreatPOV, I really thought I was about to watch a chess strategy video lol
It fits though right?! :D
nice overview. i remember in the mid 90's how simple it was to spook emails. Ah the good old days..
What's old is new again ;)
where is CISSP ?
Need another tier list video soon I think! :D
Thanks Typer and Spenser for the tools. What do you think about Purple knight ?
PurpleKnight is also a great FREE tool. I'm a fan of it
Have recently subscribed to this channel, and really like the one-on-one chats between experts in their various fields. Especially when discussing some of the issues you see on jobs and where you see customers failing over and over, and how you would improve things from a Red and Blue Team perspective. Lots of useful things in these videos, so thank you and keep up the great work.
That truly means a lot to us. Thank you so much for the kind words. As long as yall are watching/listening and getting value we will keep the content coming. 💪🙏
Great content thank you for uploading!
Super appreciate that. Thanks so much!!
What note taking applications do you guys use? Do you have something different for building your report during a pentest vs something to use while studying/practicing pentesting? I've heard a lot of popular options like Obsidian and Notion but it'd be nice to hear the opinion of actual pen testers. This channel is an absolute gold mine BTW! Every episode has helped me tremendously as a new pentester/new to cyber, so thank you!
Wow thanks so much for the kind words! We really appreciate that. Some of us use obsidian, others use notepad++. It's really user preference. I'm a big fan of notepad++ myself. Kind of low-tech but it really has some nice features like regex support, diff, macros. As far as reporting, yeah we use a commercial platform that helps us convert findings into a nicely styled and formatted word/pdf document.
I seem to have been stuffed with tons of credentials. I have no idea how I got them, don't know if I'm using them, but I know they are there. I've looked at them... There are too many for me to look at all of them. should I be concerned?
Perhaps
Great episode! Looking forward to the flipper zero episode!!
Thank you!!
Ejpt sucks. The fact that it doesn’t have a renewal track means you constantly would have to take it every three years to renew. The pricing is fine but C for the horrible renewal. Even if you don’t get other certs you should have the ability to upgrade by taking a higher cert from them
That's fair. Many times renewal requirements come from external requirements such as DoD
Just an FYI, if you renew your SANs cert they provide you updated materials and lab files. I know the recert fee is expensive but not $9K (~$450) so I still hope this helps someone know they can get new materials. I agree it's be nice to know timing of new courses. They do show courses in beta I believe. "Your certification renewal includes an updated set of course books, audio files, and any relevant lab files." There are certain licenses and hardware it looks like which aren't included. You can request physical books or get the digital version.
Ok interesting, that's not how I understood it, I will have to go and look again, thank you
Did you guys' place CPTS in the same position as Pentest+? I think that is really unfair considering the amount of hands-on knowledge you need to pass the CPTS. CPTS really deserves to be on the A tier. That's just my opinion...
That's fair. We should really do another certification tier list video
Great stuff guys!
Thank you, appreciate that!!
Ejpt over Cpts... Ummm..
This was recorded when cpts first came out, we should make a new video!
COOL!
thanks!
I have the CPTS and it should definitely be S tier. But I can understand at the time this video was uploaded it might’ve not been known how great it is
this video was made when the cpts first came out. I think if I recorded it now I would agree
I’ve never done actual pentesting, I’ve only done Bug Bounties. But I would think in a pentest, the limited time is a big deficiency. The top bug bounty hunters that hack apps like Google or Yahoo have months of deep diving into the applications and they figure out unique ways to hack applications. Another issue with Pentesting is once you get RCE then I would think the motivation to find other bugs die down. You’ve already proved a big impact bug, so there’s no need to look for CSRF or XSS. But in Bug Bounty, each bugs makes you money so after finding an RCE, as a bug hunter, I would go deeper into finding as many bugs as I can. Because where there’s smoke there’s fire.
Great episode thanks for the upload
ty, appreciate you!
Awesome guide
thanks!
I think what makes OSCP A tier and not S tier is the training. Yes, it has the name recognition, but if you were to put one person through the PWK and another through TCM training, and don't bother with testing, the TCM student would perform better at the job.
That's fair, a lot has changed in the last 7 months too...
When I first heard this as a Podcast, I thought you were saying "Pink" Castle. Makes a lot more sense now!
I blame being from NY and talking fast. 😆glad the message finally got through though :)
Just started python, this episode hurts though.. not sure I could ever do all that on top of doing my CPST
Rome wasn’t built in a day. Take it slow. There’s no need to overwhelm yourself! You got this.
SANS is just a big rip off 😢
Aye!! Loved the podcast. Thank you gentleman for your insight. As a Security Operations Engineer trying to break into the pentesting field and holding eJPT, CRTP, PNTP, CRTO, and gunning for OSCP in 2024, I had a big, goofy smile on my face by the end of it. Darrius, how did the GCPN certification treat you? I just found this channel today, but I skimmed through the videos and didn't see a "I'm sorry, I messed up" post about it 😆Also CPTS seems to be taking the industry by storm now. I've heard nothing but great things about it recently to the point where I'm contemplating purchasing it after OSCP. It would be fantastic to get a firsthand review from your team if someone has the time to pursue it this year.
Hey, You have all the certs I am aiming for. I completed ejpt, going for pnpt. I wanted to go oscp after that.(maybe cpts after this) Would you recommend me to go for crto or crtp after oscp. Or should I skip them and go for gpen?
Hey! That sounds like a solid path. My recommendation would be based on what your goals are. For example, I took CRTP and CRTO to gain a more in-depth understanding of internal network penetration testing, red teaming, and Opsec (or in this context "how to be sneaky when performing engagements"). The knowledge gained in these certs has benefited me in my current role with hardening the systems I'm assigned to protect, but I'm also aiming to one day do exactly what Spencer does and conduct Assumed-Breach Internal Penetration tests. The CRTO and CRTP were a logical choice for me to make. Although they're red teaming certifications, they go into more detail on Active Directory attack vectors. Personally, I would only take GPEN if my company offered to pay for it, but it's not on my to-get list at this time for the same reasons discussed in this video. @@samxkaizen
@@ndog315 Thanks a lot Mate. Will definitely follow the path you recommended.Thankyou for the guidance.
I’ll let Darrius comment about GCPN if he would like. However, from my (Spencer) perspective and from what I’ve heard… CPTS is 1) more realistic and representative of the skills a pentester should have in 2024 and 2) it’s harder than OSCP, and 3) it’s not a 24 hour exam, you get much much longer which is great. You also have to complete the course material before you can even attempt the exam. Whereas with other certs you could just take the exam only if you wanted to. Overall I think CPTS is a strong contender. Lastly I will say, certs are not the only way to show competency. Blogs, videos, tutorials, social media content, talks at cons, research, etc. there’s so much more you can do now to show you know your stuff then stacking certifications. They are still valuable just less than we like to think they are.
Darrius here. Overall I’d say that the gcpn was decent. I ended up scoring above 90 on it. While the material is decent and probably great for beginners the lack of a practical portion for the exam keeps it at B or C tier. CPTS is definitely getting up there also.
Thanks for this. Noted for future certs. :)
Glad it was helpful!
Bro this will be helpful for my future certs. very informative based on real pen testers. please upload more videos like this, like HTB certs such as CBBH, CDSA
You’re so welcome. We will do another episode like this with other certs for sure!
www.securit360.com/threat-intel-newsletter/
so, fuzzing.
Essentially yea
Would love to see some more. Not too many great certs or clear paths for webapp pentesting got the cbbh and burpsuite practioner lined up but thats it
I’ve been noticing a handful of people in my feed getting OSWE. Maybe there’s value there I don’t know it personally that well
@@CyberThreatPOV Yeah, it's just costly and pretty damn advanced I believe
www.securit360.com/threat-intel-newsletter/
www.securit360.com/threat-intel-newsletter/
www.securit360.com/threat-intel-newsletter/
Learn how to prevent social engineering attacks -> ruclips.net/video/rB5dkpqc1rU/видео.html
More cybersecurity hot takes here -> ruclips.net/video/1mny7KF6oNE/видео.html
⚫ Weekly Threat Intel Newsletter securit360.com/threat-intel-newsletter/
⚫ Weekly Threat Intel Newsletter securit360.com/threat-intel-newsletter/
⚫ Weekly Threat Intel Newsletter securit360.com/threat-intel-newsletter/
⚫ Weekly Threat Intel Newsletter securit360.com/threat-intel-newsletter/
⚫ Weekly Threat Intel Newsletter - securit360.com/threat-intel-newsletter
Good to see @SamErde
Hi, Merill!
Good job guys !!!!❤
7:50 I like how you mentioned the Sweet32 attack Tyler. I'm currently practicing DNS enum and host discovery (namp, sublist3r, etc) and I see cryptographically weak ciphers a surprising amount of times, but rarely are MITMA's ever inscope on hackerone. But the both of you are right...exploited in the wild...probably never XD. Would either of you know a cyber security mentor or any resources other than youtube or TCM security when it comes to learning about DNS enum and other OSINT skills that will aid in attempting to bypass CloudFlare or nginx? How difficult is it these days to get the IP's of the origin server? (im doing bug bounties exclusively at the moment)
Hey Jacob, thanks for the comment! Some other resources for learning about OSINT and DNS enum could be training platforms like Udemy which our team uses to study on different materials and for certifications. In addition to this different forums such as Reddit's r/netsec and r/AskNetsec or even Stack Exchange. These forums are filled with cyber security experts who can help answer questions or even offer guidance on different attacks/methods of bypass like you mentioned. Hope this helps!
@@CyberThreatPOV Thanks! I'll check them out!
😏 "promo sm"