The Backup Operators Guide to the Galaxy
Backup Operator accounts are ubiquitous and often overlooked by both blue and red teams. These accounts have abusable permissions and are rarely maintained properly. In this webinar, we will examine and demonstrate novel techniques to stealthily compromise Active...
Software Defined Radio: With Even More Awesome!
On January 31st we started our series of monthly webinars. In our first webinar, Larry Pesce, our Director of Research talks about how to take a radio and turn it into whatever you want with software, for security or fun or both! A brief look at Software...
All Your Copy/Paste Are Belong to Us
Author: Adam Crompton, Senior Security Consultant Introduction The clipboard functionality of modern operating systems has been around for decades, implemented to provide the ability to take a bunch of 1’s and 0’s and store them temporarily. In more common...
Attacking and Defending Kubernetes: Bust-A-Kube – Episode 1
Jay Beale created two tools used by hundreds of thousands of individuals, companies and governments, Bastille Linux and the Center for Internet Security’s first Linux/UNIX scoring tool. He has led training classes on Linux security at the Black Hat, CanSecWest,...