
Sign up to save your podcasts
Or
A while back I did an episode on “learning from the red team” which focused on methods blue team members can utilize to better understand attacks and the artifacts affected by those attacks. One of the advantages of this method that I did not mention in that episode was how to use open source vulnerability scanners for the same purpose. This week, will be part two and I will go over freely available resources and the method to help you gain better insight into forensic artifacts.
4.9
6161 ratings
A while back I did an episode on “learning from the red team” which focused on methods blue team members can utilize to better understand attacks and the artifacts affected by those attacks. One of the advantages of this method that I did not mention in that episode was how to use open source vulnerability scanners for the same purpose. This week, will be part two and I will go over freely available resources and the method to help you gain better insight into forensic artifacts.
2,001 Listeners
371 Listeners
637 Listeners
370 Listeners
184 Listeners
1,015 Listeners
321 Listeners
415 Listeners
8,001 Listeners
188 Listeners
314 Listeners
73 Listeners
133 Listeners
44 Listeners
169 Listeners