2023 RSAC Livestream - Ernie Bio
12:26
About Bishop Fox
1:23
Жыл бұрын
Пікірлер
@tomsimpson5317
@tomsimpson5317 17 күн бұрын
King of the douchebags
@X_mar0ne_X
@X_mar0ne_X 23 күн бұрын
cme nxc now and yeah learned a new things about crackmapexec :) thanks!
@DavidSohn-i3t
@DavidSohn-i3t 3 ай бұрын
KP a Week
@ctrlesc-xyz
@ctrlesc-xyz 3 ай бұрын
I miss DHA and 0dayallday. I need to start attending again.
@specters6666
@specters6666 4 ай бұрын
:D we love you Justin
@vrooooom4487
@vrooooom4487 4 ай бұрын
1. It is not for you to determine what is extremely anything 2. You UPSPEAK - STOP IT and people will take you seriously then
@SabethDrake
@SabethDrake 6 ай бұрын
Oh just $20?
@TacticalDraws
@TacticalDraws 6 ай бұрын
For 3 shells
@SabethDrake
@SabethDrake 6 ай бұрын
@@TacticalDraws that seems high
@thenewyorkredneck4735
@thenewyorkredneck4735 7 ай бұрын
Oh shotguns can hurt people? Thanks for the news flash
@Ternary1982
@Ternary1982 7 ай бұрын
Amazing content, just sat here binge watching! Make more please
@Bishopfox
@Bishopfox 7 ай бұрын
Thank you! We're readily making new content and adding to our KZbin library.
@Ternary1982
@Ternary1982 7 ай бұрын
@@Bishopfox thats amazing to hear, goodluck on it!
@alexdhital3095
@alexdhital3095 7 ай бұрын
Awesome
@NoOneSpecial4212
@NoOneSpecial4212 8 ай бұрын
Gimmicky crap I just wasted 36 bucks for 3 shells that birdshot beats
@walshhaddock7255
@walshhaddock7255 8 ай бұрын
*Promosm*
@TheSenSeTime
@TheSenSeTime 8 ай бұрын
Hey there awesome video! What is the terminal you are using??? Or theme I like those icons
@BrittKemp
@BrittKemp 9 ай бұрын
Britt Howell get it!
@tiernanmorgan
@tiernanmorgan 9 ай бұрын
if you know seed is datetime could you use this to reverse enginer a slot machine?
@designzonebeats
@designzonebeats 10 ай бұрын
Only partway through, but it was so crazy, I was just reading a post by RastMouse before I came here to learn more about using Sliver with C2 BOFs :)
@snakiesnake
@snakiesnake 10 ай бұрын
What is the terminal you are using??? Or theme I like those icons
@H088YHaX0R
@H088YHaX0R 10 ай бұрын
Excellent video. Thanks for posting. Could you provide the HTB link for the double hop explanation as shown @52:11 into the video? I am subscribed Thanks.
@rogerjensen5277
@rogerjensen5277 10 ай бұрын
What is the effective range of these rounds! A shotgun round that could hurt someone, as you sure?
@mlit83
@mlit83 10 ай бұрын
People who knows antennas and how to make high gain directional antennas
@SajidQureshi__
@SajidQureshi__ 10 ай бұрын
great video but i have a question can't we just disable the EDR when we want to exexcute the agent and then reenable after our agent ran
@RaiqueFamilia
@RaiqueFamilia 6 ай бұрын
You would first have to bypass it even before running it before even thinking about disabling it, and if you managed to bypass, why would you care about disabling it if you are undetected anyway?
@DarkDonnieMarco
@DarkDonnieMarco 10 ай бұрын
I just wanted to say thanks very much. Currently studying OSEP, which is an incredible course. I was trying to decide which framework to use for the extra mile exercise and you have definitely swung it for Sliver.
@xB-yg2iw
@xB-yg2iw 10 ай бұрын
Really interesting, thanks Ben!
@gianluca4749
@gianluca4749 11 ай бұрын
is there any discord channel where we can interact with the development team?
@Bishopfox
@Bishopfox 11 ай бұрын
Absolutely! We'd love to have you over at discord.gg/redsec
@cvport8155
@cvport8155 11 ай бұрын
Please make More vd advanced techniques red team
@Bishopfox
@Bishopfox 11 ай бұрын
🏃‍♂️ On it!
@JeevaS-zd3yq
@JeevaS-zd3yq Жыл бұрын
i team i am jeeva from india one day i will join your team
@Bishopfox
@Bishopfox Жыл бұрын
Look forward to it!
@Bishopfox
@Bishopfox Жыл бұрын
Here's the corresponding blog post. Thanks for watching! bfx.social/418m7sh
@babanaber2309
@babanaber2309 Жыл бұрын
Is about OSCP or OSEP? Bcs, we see "OSEP" in title but video content targeted OSCP. Am I wrong?
@Bishopfox
@Bishopfox Жыл бұрын
From Jon: The content is for OSEP. OffSec has updated their OSCP content to include Active Directory attacks, but at a basic level. OSEP dives deeper into AD attacks and discusses AV evasion as well.
@babanaber2309
@babanaber2309 Жыл бұрын
Thank you for information. Regards,@@Bishopfox
@flrn84791
@flrn84791 7 ай бұрын
Yes you are, this has nothing to do with OSCP
@patrickm3554
@patrickm3554 Жыл бұрын
Great work! Btw it looks like CME was exporting the AS-REP user hash as AES-256 as the hash encryption type is tgs$18$ so you wouldn’t likely crack it. Kerbrute is requesting the hash as tgs$23$ which is the older RC4 encryption and much weaker/faster to crack.
@Bishopfox
@Bishopfox Жыл бұрын
From Jon: That is interesting! Really appreciate your input here and thanks for sharing with me. When I was prepping for it, I did use CME but you’re right and I mentioned it - the hash didn't crack but I didn't dig into why. I moved along to a different tool. From an OPSEC standpoint, we wouldn't want to draw too much attention to our activities on a network so CME requests the hash as AES-256 which makes sense. From an exam standpoint and CTF/etc, kerbrute's Rc4 encryption is preferred.
@patrickdee7365
@patrickdee7365 Жыл бұрын
More more more. John has a fantastic talent at explaining things!
@Bishopfox
@Bishopfox Жыл бұрын
Definitely more to come!
@CrazyMike1416
@CrazyMike1416 Жыл бұрын
Very informative and awesome show, I will be watching and learning more on my quest on Ethical Hacking. Thank you so much Bishop Fox and Defcon!!!!
@Bishopfox
@Bishopfox Жыл бұрын
Thank you! If you're not in it already, you may want to check out our Discord server - discord.com/invite/redsec. We also have a few trainings coming up before the year ends you might want to watch.
@nathanmay4818
@nathanmay4818 Жыл бұрын
This is awesome, ive got my exam scheduled and will be using sliver!
@Bishopfox
@Bishopfox Жыл бұрын
Let us know what happens - and good luck!
@BeejayDotun
@BeejayDotun Жыл бұрын
Please update your tool
@dgoncalo
@dgoncalo Жыл бұрын
Amazing content, this is a blessing! Thank you so much!
@Bishopfox
@Bishopfox Жыл бұрын
For the person who asked how to transition from pen testing into red teaming, Trevin had this to say: "Penetration testing as a background is one of the most natural paths towards red teaming that exists. Key in that evolution is being able to switch your approach and mindset from web-app only focus or network-only focus and towards "end result focus" and relaxing the restrictions on the "how" that is accomplished. After all, a wire transfer can be accomplished not just through a vulnerability in SWIFT, but also through elicitation of human beings, or even physical building compromises potentially. My suggestion for penetration testers wanting to move into Red Teaming would be to 1) focus on doing similar activities but doing them stealthily...finding ways to create payloads that will stay under the radar of common EDR products, and how to perform network scanning/enumeration in ways that are stealthy and will avoid detection. 2) seek to gain expertise in either social or physical red teaming, as a complement to their existing web or network based penetration testing skillset. Also, 3) understand the mindset and approach of blue team. What tooling do they typically use, how do they respond to key alerts. That is important in knowing how to pressure test those approaches." Hope this helps!
@trentfulbright8463
@trentfulbright8463 Жыл бұрын
is there a way to use this without knowing the font or the size
@SthenC
@SthenC Жыл бұрын
TomNomNom just seems like such a genuinely good human being. His was of thinking and describing things is just truly pleasant.
@Bishopfox
@Bishopfox Жыл бұрын
He's the best.
@mikemcdonald5147
@mikemcdonald5147 Жыл бұрын
Kristin paget is actually a guy Chris Paget. Not sure how you mess that up LOL
@DavidKennedy-
@DavidKennedy- Жыл бұрын
Just wanted to say this was excellent. Please more of this content.
@Bishopfox
@Bishopfox Жыл бұрын
That's the plan! Are there any kind of trainings you are specifically seeking?
@DavidKennedy-
@DavidKennedy- Жыл бұрын
@@Bishopfox That's great. To be honest John's stream was amazing but the Sliver stuff didn't start until 45mins in then finished just over an hour but I realise that's because it was due to the exam focus. I was glued to it from that moment on and learning about AV evasion, any character limits Sliver has and how to avoid the double hop with Rubeus was quality material. If he did an hour purely on moving around with Sliver so we can pick up tips and tricks it would be really fantastic.
@Bishopfox
@Bishopfox Жыл бұрын
@@DavidKennedy- That's an interesting idea. Happy to pass it along, and thank you again for watching.
@mojed6666
@mojed6666 Жыл бұрын
I agree it would be nice to see more about working with sliver. I do like sliver a lot. I used it doing the CRTP from altered security and used it for the lab. It was fun.
@freem4nn129
@freem4nn129 Жыл бұрын
Thx for this ! this is exactly what i needed sir !
@djosearth3618
@djosearth3618 Жыл бұрын
brilliant!! after just catching the end of the 3 guests chattting re: "kubernetes containers VS security of os particulars/hiring interview question: Uhave a lab? takeaway being atleast hgave one till youm (if erver) feel don't NEED one".Cann't wait to rewatch then catcvh w/e is streaming in th hour after that . foingerss crossed its not just 75 mins of UP NEXT as it is an archive of planned live streams during deRfcon ;]
@jgdkekrb
@jgdkekrb Жыл бұрын
This has been refreshing.
@vladrabactkit6643
@vladrabactkit6643 Жыл бұрын
how to buy
@c0d3ster
@c0d3ster Жыл бұрын
really good conversation, thank you
@Bishopfox
@Bishopfox Жыл бұрын
Thank you for tuning in!
@Korn1699
@Korn1699 Жыл бұрын
I didn’t even know that I had his book until I saw the reference on this video…lol. I got it a while back and saw him speak a few times at GrrCon (even got into a little argument with him at the 2021 GrrCon).
@MahiUddin-ck3om
@MahiUddin-ck3om Жыл бұрын
🥰
@molotov5000
@molotov5000 Жыл бұрын
i wish i could go to defcon
@zoenagy9458
@zoenagy9458 Жыл бұрын
very slow attack
@2024paradigmshift
@2024paradigmshift Жыл бұрын
Wish I could be there
@Bishopfox
@Bishopfox Жыл бұрын
You can watch!
@dinozorman
@dinozorman Жыл бұрын
Is this def con or a shitty podcast?