Live Webinar "Purple Team Primer"
June 27, 12PM PDT / 3PM EDT
Packet ninja Mike Poor will discuss tools, techniques and tips for packet creation, slinging, capture and analysis.
May 30 12PM PDT / 3PM EDT
Red Team Primer For Executives
InGuardians Offensive Security Team
Join us for a primer on Red Team Penetration Testing. InGuardians Offensive Services Team will discuss what is a red team pentest, what clients should be considering when preparing one, and what to expect to learn from the results.
April 18 12PM PDT / 3PM EDT
scanners, tunnels, and sims, oh my!
Justin Searle, Director of ICS Security, InGuardians
When it comes to testing and analyzing ICS communications in your lab, what’s even better than getting your hands on tools from your engineers? Easy. Having your own set of tools – available for free, customized for your current needs, and extendable for your future needs. Welcome to the Control Things Tools project! Born out of the Control Things Platform, a Kali-esque distribution for ICS professionals, Control Things Tools attempts to bring these customizable tools directly to you. This project consists of a separate but similar tool for each protocol and/or technology layer, complete with a simple-to-use python library for you to make (or contribute) your own such tools. Join us to explore the public release of the first series of these Control Things Tools: cti2c, ctspi, ctserial, ctip, ctmodbus, ctvelocio, and the python library that provides the command-line and graphical interfaces for these tools.
March 28 12PM PDT / 3PM EDT
Hacking and Hardening kubernetes
Jay Beale, CTO at InGuardians
With microservices’ rise, Kubernetes gain adopters every day. It’s time for information security specialists to learn how to attack and defend container orchestration systems. This webinar will demonstrate attacks on Kubernetes clusters, then defenses that break those attacks.
1: Understand how to attack Kubernetes and other container orchestration platforms.
2: Understand how to defend Kubernetes, at a deep, hands-on level.
3: Understand the Kubernetes attack surface and security features and those of Linux/Docker containers.
February 21 12PM PST / 3PM EST
All Your copy/paste are belong to us
Adam Crompton, Senior Security Consultant, InGuardians
The clipboard functionality of modern operating systems has been around for decades, implemented to provide the ability to take a bunch of 1’s and 0’s and store them somewhere temporarily with ease. In more common parlance, we know this as the functionality of Copy/Paste, or CTRL-C/CTRL-V. In this relationship, the clipboard is the temporary storage for the items picked up by the copy operation, later to be retrieved by the paste operation.
The intent of this webinar is not to go on about clipboard functionality, but to make viewers aware of the evil that comes with the functionality.
Our Senior Security Consultant Adam Crompton will share some interesting finds, along with demos in this LIVE webinar!
January 31 12PM PST / 3PM EST
software defined radio: with even more awesome
Larry Pesce, Director of Research, InGuardians
This month, Larry Pesce, our Director of Research, will lead a discussion about Software Defined Radio platforms. In this webinar, you’ll examine a few interesting software packages (with demos) to begin your exploration of the RF spectrum. You’ll also discuss what the advent of SDR can do to change the landscape for C&C, data exfiltration and information gathering.
Linux Attack and Defense: Exploiting a PHP Application and Breaking the Exploit ( Part of the BeyondTrust webinar series)
In his previous webinar, Jay Beale, co-founder and CTO of InGuardians, attacked a Linux network and demonstrated how to detect and automatically break that attack. Continuing the theme, in this webinar, Jay will put his black hat on again to attack a vulnerable...
Hacking and malware attacks, including ransomware attacks, are a major cause of breaches in 2017. With high-profile ransomware attacks on the rise, enterprises and small businesses worldwide are looking to better secure their data from cyber criminals and more...
Attack and Defense Training: Saving Mr Robot’s WordPress with the Free AppArmor (Part of the BrightTalk webinar series)
In this webinar Jay Beale, co-founder and CTO of InGuardians, will demonstrate how an attacker gains access on a server running WordPress and then teach you how to break the same attack with a free, open source tool called AppArmor that’s been part of the Linux kernel...
Join this interactive Q&A session and learn the facts about the recent NotPetya attack on the Ukraine and the collateral damage it caused by crippling large businesses and organizations worldwide. Topics that will be discussed during this live Q&A panel will...
How to Attack a Linux System + Ways to Detect and Respond Swiftly ( Part of the BeyondTrust webinar series)
Bad actors continue to target our Linux systems. With a small amount of effort, we can detect their first access to the system and stop them before they move laterally. But how did they get into our systems in the first place? And what are the procedures for a swift...
Internet of Things devices are notoriously lacking in security, making them easy targets for attackers to hijack and leverage in DDoS attacks. How have cyber attacks evolved in the last few months? What is the impact of the IoT devices on cybersecurity across...
- Broadcast LIVE from Las Vegas during Black Hat 2017 - Disruptors and visionaries across the globe are pushing the boundaries of science and technology, economics and industry, healthcare, policy, communications, and governance. From these advances emerge new career...
Cloudflare revealed a serious bug in its software in February, which caused sensitive data like passwords, cookies, authentication tokens to spill in plaintext from websites using Cloudflare Content Delivery Network (CDN). Join this panel of experts and learn: - Who...
Data Theft in the 21st Century: Detect and Block PII & PEI Theft (Part of the BrightTalk webinar series)
Cybersecurity expert Jay Beale will provide a State of the Industry look into theft and exposure of huge data sets of PII (personally identifiable information) and PEI (personally embarrassing and exposing information). Join this presentation and learn about the...