Channel Avatar

SANS Offensive Operations @UCP28F4uf9s2V1_SQwnJST_A@youtube.com

28.4K subscribers - no pronouns set

SANS Offensive Operations leverages the vast experience of o


01:26:08
Mastering Adversary Emulation with Caldera: A Practical Guide
01:29:51
The Second Rule of Hacking: There Are No Rules
59:33
From Pentest to Red Team: Overview of The Necessary Skills and Breakdown of Frameworks
01:23:22
OT Pen-testing: How Not to Sink an Oil Rig
32:42
Fortifying Resilience: An In-Depth Exploration of the Overall Product Security Assessment Poster
00:51
SANS Pen Test 2024: A Sneak Peek Into All That's in Store!
01:45
Learn About SEC565: Red Team Operations and Adversary Emulation
28:29
A Compendium of Exploits and Bypasses for eBPF-based Cloud Security
31:19
Proxyjacking: The Latest Cybercriminal Side Hustle
34:26
A Series of Unfortunate Events: A Tail of Hacking Organizations Through Bug Bounties
35:25
The Latest Exploit (BLASTPASS) in the Ongoing NSOZero-Click/Zero-Day Exploitation Campaign
34:50
Just Pocket Change? Examining the Cost of ā€œNickel and Dimeā€ Exploit Mitigations
30:03
A Hole in the Bucket: The Risk of Public Access toCloud Native Storage
35:03
Seek Out New Protocols, and Boldly Hack Undetected
32:37
A Practical Approach to Smart Fuzzing:Discovering 8 Zero-Days in a Week
40:43
Modern Adversarial Reconnaissance ā€“ Long Live the External
29:41
Enhancing Red Teaming with AI and ML
42:02
Keynote | Hacking the Cloud Like an APT
27:08
Unlocking Secrets: An Exploration of PulseView &Side-Channel Timing Attacks
34:19
The Invisible Threat: AI-Powered Vishing Attacks and Defense Strategies
28:03
Ab)using the Microsoft Identity Platform: ExploringAzure AD Token Caching
46:12
That Shouldnā€™t Have Worked
33:03
Anti-Deception: Catching the Canaries
40:42
Keynote | Security Research: Not Just for Nation States
01:06
Combating Supply Chain Attacks with Product Security Testing
01:18:28
VulnerabilityGPT: Cybersecurity in the Age of LLM and AI
01:00:07
Cloud Scanning For Vulnerability Discovery
56:51
Sneak Peek - SEC598: Security Automation For Offense Defense And Cloud
34:44
Smart Contract Hacking
39:38
Hacking Serverless Applications:A Treasure Map for Uncharted Waters
31:02
MalDev and Syscalls and BOFs, Oh My!
45:33
Lookinā€™ for Bugs in All the Wrong Places
40:40
Santa's Guide to Breaking into Buildings
26:56
Kernel Karnage: Patching EDR in Kernel Space
37:33
Offensive Forensics
32:57
What I Wish I Knew Before Pentesting AWS Environments
24:25
Cyber Resilience: Purple Team Success in Practice
29:36
Flying Under the Radar: Hiding Web Shells From Web Application Firewall
35:53
Attack and Defend: Leveraging AWS Serverless Technology for End-to-End C2
41:38
Purple Teaming in an Enterprise: Why, Who, When, and How
39:30
Crafting Adversarial Detections at Scale in Google Cloud Platform
18:33
Micro Emulation Plans: Making Adversary Emulation Accessible
37:26
Cloudy With A Chance of Purple Rain: Leveraging Stratus Red Team to Secure Your Clouds
47:50
Tactical MiTM for Attack and Defense
37:46
Purple Teaming Cloud Identity: Simulation Labs for Red and Blue Teams
36:36
Top Network Attacks ... and How to Fix them
36:09
Red + Blue = Purple: Our Journey Building a Dedicated Purple Team at Meta
28:03
Developing HIgh-Impact Malware with Minimal Effort
38:14
Fun with Shellcode (Loaders)
46:40
Keynote: Reframing Hard Cybersecurity Problems for Fun and Profit
51:01
Keynote: Researched Adversaries
31:24
Master of Puppets: How to Tamper an EDR?
26:44
Getting Started with Atomic Red Team
27:42
In the Trenches: Purple Team Doā€™s and Donā€™ts
40:15
Advanced Purple Teaming
17:18
Iā€™ve Got a Golden Twinkle in My Eye
28:17
Purple Team PIRs: What Adversary Emulations Need From Cyber Threat Intelligence
41:13
Maximizing the Value of Attack Detection Tooling with Atomic Purple Teaming
01:00:07
Cloud Scanning For Vulnerability Discovery
41:24
Panel: Web3 Wars - A New Hope