
Sign up to save your podcasts
Or
A while back I did an episode on “learning from the red team” which focused on methods blue team members can utilize to better understand attacks and the artifacts affected by those attacks. One of the advantages of this method that I did not mention in that episode was how to use open source vulnerability scanners for the same purpose. This week, will be part two and I will go over freely available resources and the method to help you gain better insight into forensic artifacts.
4.9
6161 ratings
A while back I did an episode on “learning from the red team” which focused on methods blue team members can utilize to better understand attacks and the artifacts affected by those attacks. One of the advantages of this method that I did not mention in that episode was how to use open source vulnerability scanners for the same purpose. This week, will be part two and I will go over freely available resources and the method to help you gain better insight into forensic artifacts.
361 Listeners
626 Listeners
364 Listeners
182 Listeners
1,009 Listeners
312 Listeners
396 Listeners
7,859 Listeners
187 Listeners
312 Listeners
6 Listeners
117 Listeners
33 Listeners
158 Listeners
14 Listeners