
Sign up to save your podcasts
Or


Happy summer, Cyberheads! In this episode of the #CyberChats special edition summer series, we explore why thinking like a bad actor can help you be a better defender.
In this episode, we discuss the basics of Adversarial Thinking, and how this switch in mindset can allow you to find weaknesses you might not have thought of before. What are some basic attacks that bad actors use to gain access? What are their next steps once they get in? How can you use this knowledge to slow down or stop the bad actors?
Finally, put your new knowledge to practice in our third of three Summer Cyber Challenges on MetaCTF: Basic Login! Register below, compete individually or join a team, and look for your name on the leaderboard. Be sure to come back here in two weeks as we work through the Challenge together.
Topics discussed: adversarial thinking, brute force attacks, account lockouts, whoami command, Wireshark, OSI model
Register here for the NCF’s FREE Summer challenges with MetaCTF: https://metactf.com/join/cyberchats
Never miss an episode or Challenge drop by signing up for our #CyberChats newsletter at: https://cryptologicfoundation.org/podcast
By National Cryptologic Foundation (NCF)Happy summer, Cyberheads! In this episode of the #CyberChats special edition summer series, we explore why thinking like a bad actor can help you be a better defender.
In this episode, we discuss the basics of Adversarial Thinking, and how this switch in mindset can allow you to find weaknesses you might not have thought of before. What are some basic attacks that bad actors use to gain access? What are their next steps once they get in? How can you use this knowledge to slow down or stop the bad actors?
Finally, put your new knowledge to practice in our third of three Summer Cyber Challenges on MetaCTF: Basic Login! Register below, compete individually or join a team, and look for your name on the leaderboard. Be sure to come back here in two weeks as we work through the Challenge together.
Topics discussed: adversarial thinking, brute force attacks, account lockouts, whoami command, Wireshark, OSI model
Register here for the NCF’s FREE Summer challenges with MetaCTF: https://metactf.com/join/cyberchats
Never miss an episode or Challenge drop by signing up for our #CyberChats newsletter at: https://cryptologicfoundation.org/podcast