DiscoverAntisyphon Training Anticasts
Antisyphon Training Anticasts
Claim Ownership

Antisyphon Training Anticasts

Author: Antisyphon Training

Subscribed: 0Played: 0
Share

Description

Podcast audio-only versions of weekly webcasts from Antisyphon Training
8 Episodes
Reverse
🧦 SOC Summit 2026https://www.antisyphontraining.com/event/soc-summit/Is your Incident Response plan AI ready?Join us for a free one-hour training session with incident management expert and instructor Gerard Johansen, where he'll teach how to adapt your Incident Response plan to AI-related risks and threats.You’ll learn how AI incidents actually happen and how to respond to them.Gerard will also cover what to include in your incident response plan so you’re prepared as your organization adopts AI.🛝 Webcast Slideshttps://www.blackhillsinfosec.com/wp-content/uploads/2026/03/SLIDES_Antisyphon-Anti-Cast-IR-in-AI.pdfChapters(00:00) - Intro (02:45) - Who is Gerard Johansen (03:22) - Webcast Agenda (05:10) - Our Guardrails (07:48) - Challenges in AI Incident Response (10:00) - Artificial Intelligence Hype (10:58) - Our Assets Column (12:11) - History doesn’t repeat, it rhymes. (15:21) - Classification Model (17:20) - Threat Actor Use (18:52) - Threat Actor - Case Studies (20:13) - Key Points to Consider (21:52) - GenAI Targeting (22:33) - GenAI Targeting - Case Studies (23:14) - [more] Key Points to Consider (24:45) - Internally Generated AI Incident (26:14) - Internally Generated - Case Studies (27:12) - [even more] Key Points to Consider (29:21) - AI Readiness Planning - Key Assumptions (30:18) - AI Readiness Planning (30:58) - Establish a clear and concise definition (32:31) - Establish Incident Criteria (34:36) - Rework Existing Processes (36:38) - Tie in Additional Stakeholders (37:56) - Information Sharing (41:25) - AI Incident Premortem (44:25) - Continuously Review (46:25) - Hypothesize, Test & Improve (48:35) - Key Points for the plan (50:59) - Sumamry (52:15) - Questions & Discussion Creators & Guests Gerard Johansen - Guest Deb Wigley - Host Jason Blanchard - Host Meagan Bentley - Producer Chat with your fellow attendees in the BHIS Discord server:https://discord.gg/bhisin the #🔴live-chat channel🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.comClick here to watch a video of this episode. Brought to you by:Black Hills Information Security https://www.blackhillsinfosec.comAntisyphon Traininghttps://www.antisyphontraining.com/Active Countermeasureshttps://www.activecountermeasures.comWild West Hackin Festhttps://wildwesthackinfest.comClick here to view the episode transcript.
🧦 SOC Summit 2026https://www.antisyphontraining.com/event/soc-summit/SummaryAre you currently testing your AI systems the same way you test traditional apps?🛝 Webcast Slideshttps://www.antisyphontraining.com/wp-content/uploads/2026/02/AI-LLM-Red-Teaming.pdfJoin AI researchers Brian Fehrman and Derek Banks for a free one-hour training session that breaks down the OWASP Top 10 AI-LLM risks clearly and practically.You’ll learn in this Antisyphon Anti-cast how LLM security issues show up in real systems, how attackers test them, and what to focus on to secure AI applications with a practical, security-first mindset.Chapters(00:00) - Intro (01:21) - Webcast Agenda (02:33) - Workshop: Hacking AI-LLM Applications (03:01) - Training: Attacking, Defending, and Leveraging AI-LLM Systems (03:23) - BHIS AI Security Assessments (03:36) - AI Security Ops Podcast (04:08) - LLM Security Introduction (06:09) - Foundation Model Training (09:47) - Chatbot (15:10) - AI Agents (18:08) - LLM Safety Versus Security (24:06) - OWASP Top 10 for LLM Applications (24:45) - – Prompt Injection (29:23) - – Sensitive Information Disclosure (32:58) - – Supply Chain (37:14) - – Data and Model Poisoning (40:30) - – Improper Output Handling (42:03) - – Exessive Agency (43:59) - – System Prompt Leakage (45:29) - – Vector and Embedding Weaknesses (47:01) - – Misinformation (49:57) - – Unbounded Consumption (52:22) - Red Team Methodology (53:18) - Threat Modeling an LLM App (54:53) - Defense-in-Depth for LLM Apps (56:01) - Red Team Tools & Frameworks (56:43) - Key Takeaways (01:00:46) - Q&A Creators & Guests Brian Fehrman - Guest Zach Hill - Host Derek Banks - Guest Meagan Bentley - Producer Chat with your fellow attendees in the BHIS Discord server:https://discord.gg/bhisin the #🔴live-chat channel🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com✏️ Training with Brian and Derek:>Workshop: Hacking AI-LLM Applications>Attacking, Defending, and Leveraging AI-LLM SystemsClick here to watch this episode on YouTube. Brought to you by:Black Hills Information Security https://www.blackhillsinfosec.comAntisyphon Traininghttps://www.antisyphontraining.com/Active Countermeasureshttps://www.activecountermeasures.comWild West Hackin Festhttps://wildwesthackinfest.comClick here to view the episode transcript.
🧦 SOC Summit 2026https://www.antisyphontraining.com/event/soc-summit/SummaryAre your go-to Active Directory attacks quietly failing without you noticing?Join Eric Kuehn, Principal Security Consultant at Secure Ideas, for a free one-hour training session that takes a deep dive into the security enhancements Microsoft has introduced to Active Directory over the past few years and how they are reshaping the way penetration testers and defenders operate.You’ll learn how long-reliable attack paths now break, how successful attacks may leave new and unexpected traces, and what these changes mean for staying stealthy during an engagement.Eric will teach you the latest AD hardening features, the new detection opportunities they create, and the practical changes testers and defenders can make to improve their tradecraft right away.Chapters(00:00) - Intro (01:41) - I am Eric Kuehn (05:55) - “Recent” Change Timeline (09:26) - 2026 And Beyond (13:46) - NTLM Finally Going Away (19:40) - Kerberos PAC Signatures (23:35) - What Does It Mean to Us? (25:30) - Certificate-Based Authentication (29:58) - Non-Security Events for PAC and Certificate Issues (31:19) - Certificate Services Audit Events (32:23) - Kerberos Enhancements (35:30) - In Summary (38:11) - Demo Time (49:37) - Q&A CreditsCreators & Guests Zach Hill - Host Eric Kuehn - Guest Meagan Bentley - Producer Jennifer Shannon - Guest Chat with your fellow attendees in the BHIS Discord server:https://discord.gg/bhisin the #🔴live-chat channel🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.comClick here to watch a video of this episode. Brought to you by:Black Hills Information Security https://www.blackhillsinfosec.comAntisyphon Traininghttps://www.antisyphontraining.com/Active Countermeasureshttps://www.activecountermeasures.comWild West Hackin Festhttps://wildwesthackinfest.comClick here to view the episode transcript.
🧦 SOC Summit 2026https://www.antisyphontraining.com/event/soc-summit/SummaryWhen was the last time you reviewed the security of your mail flow rules? Join instructor Kevin Klingbile to learn how attackers exploit weak mail flow rules and how to stop them. Kevin will teach you through real-world examples of rule bypasses, show you how to spot risky configurations, and teach practical steps to secure your email environment. In this free one-hour Antisyphon Anti-cast, you'll strengthen your defenses and make sure your mail flow rules aren’t the next easy target.🛝 Webcast Slides:https://www.antisyphontraining.com/wp-content/uploads/2026/02/strengthen-m365-configs-kevin-klingbile.pdf✏️ Antisyphon Training with Kevin:https://www.antisyphontraining.com/product/defending-m365-azure-with-kevin-klingbile/Chapters(00:00) - Intro – How to Strengthen M365 Exchange Online Configurations with Kevin Klingbile (01:24) - Excahnge Online (03:59) - Exchange Mail Flow Rules (04:32) - Rule Requirements - Conditions (08:48) - Rule Settings (12:27) - Rule Flow (18:46) - Creating “Good” Rules (25:34) - Rule Example - Conditions vs Description (28:41) - Rule Function - Message Sent to Organization (29:51) - Reply to email chain and... (31:08) - Microsoft’s Solution! (Sort of) (32:22) - Mail Rule vs Disclaimer (32:32) - Modify Original Rule (33:15) - New message “Bypassing” Subject Rule (35:15) - Common Rule Issues (41:56) - Phishing Products (42:51) - X-Header Bypass Examples (43:05) - X-Header Example - 2 (43:58) - Direct Send (46:02) - Direct Send - Transport Rules (47:04) - Disable Direct Send** (48:10) - DMARC (48:38) - Securing Exchange Online (49:11) - Q&A Start (57:58) - Other Antisyphon Events (01:05:47) - Final Thoughts Creators & Guests Zach Hill - Host Meagan Bentley - Producer CJ Cox - Guest Kevin Klingbile - Guest Chat with your fellow attendees in the BHIS Discord server:https://discord.gg/bhisin the #🔴live-chat channelClick here to watch a video of this episode. 🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.comBrought to you by:Black Hills Information Security https://www.blackhillsinfosec.comAntisyphon Traininghttps://www.antisyphontraining.com/Active Countermeasureshttps://www.activecountermeasures.comWild West Hackin Festhttps://wildwesthackinfest.comClick here to view the episode transcript.
🧦 SOC Summit 2026https://www.antisyphontraining.com/event/soc-summit/Which AI workflows are already running in production SOCs right now, and which ones could you implement by next week?🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits:https://poweredbybhis.com 🛝 Webcast Slides:https://www.antisyphontraining.com/wp-content/uploads/2026/01/Effective-AI-for-Practical-SecOps.pdf✏️ Learn from Hayden on Antisyphon Training:https://www.antisyphontraining.com/search/HaydenJoin Hayden Covington (Black Hills Infosec - SOC SecOps Lead) for a free one-hour training session to learn how to augment security analysts with AI through practical, tested workflows. Cut through the noise of vendor demos, hype, and ChatGPT wrappers. Hayden will teach you practical AI workflows that help analysts work faster and smarter without replacing their judgment. Learn real techniques for detection engineering, case management, and QA, plus where AI truly helps (and where it doesn’t) so you can apply it right away.Chat with your fellow attendees in the BHIS Discord server:https://discord.gg/bhisin the #🔴live-chat channelChapters:(00:00) - INTRO – 2026-01-28 Effective AI Hayden (02:41) - About Hayden (03:45) - What This Session Is (and Isn't) (04:38) - Let's Get Something Straight (06:23) - What Augmentation Actually Looks Like (12:15) - Before You Implement Anything...STOP (13:26) - Consideration: Cost (18:42) - Consideration: Policy & Legal (20:53) - Consideration: Data Sensitivity (21:33) - Consideration: Team Buy-In (23:47) - Consideration: PEBKAC (28:07) - How We'll Break Down the Use Cases (29:26) - Start This Week! – AI Projects: Curated Team Agents (32:24) - Building a Good Agent (33:30) - Detection Code Review Agent (35:43) - Detection Code Review: Example Prompt (GH) (37:13) - Why Markdown and Change Controlled Prompts Win (38:50) - Start This Week! – SOC Analyst Agent (40:32) - SOC Analyst Agent: Example Prompt (42:08) - Other Agent Examples (43:05) - Quick Wins: Raycast InfoSec Extensions (44:56) - Raycast Example (45:24) - Build This Month! – Case Management: Alert Titles & Summaries (46:35) - Case Management: Example (47:22) - Case Management: Sample Implementation (48:20) - Build This Month! – Quality Assurance: Automated Ticket Review (48:56) - QA Workflow Options (49:57) - QA: What It Catches (50:27) - QA: Sample Prompt (51:49) - Build This Month! – Detection Engineering: First-Draft Generation (53:24) - Detection Engineering Workflow (54:16) - Detection Engineering: Starter Approach (54:57) - Detection Engineering: Sample Prompt (57:10) - Where AI Often Fails (59:39) - Key Takeaways (01:00:43) - Resources & Next Steps (01:02:09) - QA Start (01:05:01) - Patterson's Workshop Creators & Guests Hayden Covington - Guest Meagan Bentley - Producer Jason Blanchard - Host CJ Cox - Guest Patterson Cake - Guest Brought to you by:Black Hills Information Security https://www.blackhillsinfosec.comAntisyphon Traininghttps://www.antisyphontraining.com/Active Countermeasureshttps://www.activecountermeasures.comWild West Hackin Festhttps://wildwesthackinfest.comClick here to view the episode transcript.
🧦 SOC Summit 2026https://www.antisyphontraining.com/event/soc-summit/What if you could uncover secrets hidden in plain sight, weaving together digital breadcrumbs to reveal the untold stories of the online world? Join Mishaal at WWHF Mile High '26 – In-Person or Virtualhttps://www.antisyphontraining.com/product/next-level-osint-with-mishaal-khan/🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com Join instructor Mishaal Khan for a free one-hour hands-on training session, where you'll navigate real-world scenarios and build an investigation mind map, incorporating email addresses, phone numbers, Google Maps, APIs, and online form abuse. Learn to use unconventional hacker-style techniques to find information that could unlock a treasure trove and move the investigation forward. Mishaal will teach you new techniques and efficient ways of using common tools for unexpected results.Chat with your fellow attendees in the BHIS Discord server:https://discord.gg/bhisin the #🔴live-chat channelChapters:(00:00) - Intro- Finding John Cena (09:47) - Data brokers + remote browsing to bypass geo/blocks (28:28) - Midshow Q&A (28:55) - Do you need a PI license to do OSINT? (30:53) - Is it harder/easier to find info outside the US (GDPR/Europe)? (32:27) - AI/automation in your research—building that as you go, correct? (33:42) - Best way to protect yourself against OSINT? (52:14) - Post Show Q&A (52:41) - How is the Kaido method not unofficial pen testing? (54:08) - How much deeper do you go in your course/class? (55:50) - When you run out of tools, how do you find new alternatives? (59:01) - Do you need to record findings in an admissible way—and what tool? (01:03:17) - Best ways to contact Mishaal (01:04:33) - Closing remarks + upcoming events Creators & Guests Meagan Bentley - Producer Mishaal Khan - Guest Zach Hill - Host Brought to you by:Black Hills Information Security https://www.blackhillsinfosec.comAntisyphon Traininghttps://www.antisyphontraining.com/Active Countermeasureshttps://www.activecountermeasures.comWild West Hackin Festhttps://wildwesthackinfest.comClick here to view the episode transcript.
🧦 SOC Summit 2026https://www.antisyphontraining.com/event/soc-summit/Are attackers hiding in your DNS traffic right now?🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.comJoin instructor Faan Rossouw for a free one-hour training on hunting malware that uses DNS as a covert communication channel.C2 frameworks, RATs, and backdoors frequently exploit DNS to stay hidden - sometimes for months. High-profile attacks like SolarWinds' Sunburst demonstrate just how devastating undetected DNS exfiltration can be.This Antisyphon Anti-Cast focuses on behavior-based threat hunting techniques that go beyond signatures to uncover suspicious DNS activity attackers think they've hidden.You'll learn how to:* Recognize network artifacts that DNS tunneling produces* Identify anomalies in DNS record types that signal malicious use* Leverage open-source tools like Zeek, RITA, and Sysmon to detect malware abusing DNS* Build detection strategies that make it very hard for DNS-based threats to remain hiddenIf you're ready to stop trusting DNS and start verifying it, this session will give you the practical skills to hunt what's lurking in your network.Chapters:(00:00) - Intro - Threat Hunting Malware Communication over DNS (01:05) - Introducing Faan (02:40) - Threat Hunting C2 Over DNS (04:12) - Threat Hunting - What is it and why is it awesome? (05:54) - Assumed Compromise (07:07) - David J. Bianco – Pyramid of Pain Guy (13:40) - C2 Over DNS (28:15) - TXT Record Abuse (32:58) - Null Record (35:19) - CNAME, MX, SRV… Oh my (38:38) - DNS Sandwhich (43:00) - ID Field Missuse (49:10) - EDNS0 (52:45) - Encrypted DNS (55:27) - Main Takeaway (56:26) - The Workshop: Build a Reflective Shellcode Loader C2 in Golang (58:03) - Q&A Start (01:00:27) - DNS and Splunk? (01:02:00) - Suggestions for Detecting DGA? (01:03:37) - Offensive Security Tooling from a Threat Hunter Perspective (01:07:39) - Restrict outbound DNS to protect against C2? (01:09:18) - Communicating the value of Threat Hunting to Higher Ups. (01:14:01) - Closing Remarks Creators & Guests Faan Rossouw - Guest Zach Hill - Host Meagan Bentley - Producer Brought to you by:Black Hills Information Security https://www.blackhillsinfosec.comAntisyphon Traininghttps://www.antisyphontraining.com/Active Countermeasureshttps://www.activecountermeasures.comWild West Hackin Festhttps://wildwesthackinfest.comClick here to view the episode transcript.
🧦 SOC Summit 2026https://www.antisyphontraining.com/event/soc-summit/How do you use hacking tools? 🛝 Webcast Slideshttps://www.antisyphontraining.com/wp-content/uploads/2026/01/IntroToHackingTools-kent-and-jordan.pdf🎓Antisyphon Training with Kent & Jordan at WWHF Mile High 2026:https://www.antisyphontraining.com/product/active-directory-security-and-hardening-with-jordan-drysdale-and-kent-ickler/Join instructors Jordan Drysdale and Kent Ickler (Black Hills Information Security – Testers) for a free one-hour training session featuring a live demonstration of hacking tools in a speed run against a messy Active Directory domain.You’ll get a rapid-fire introduction to Jordan and Kent’s standard hacking techniques and learn strategies based on their popular Lab Building 101 framework.Kent and Jordan will demystify how these tools work so you can feel confident using them yourself.Chapters:(00:00) - Intro - Intro to Using Defense Hacking Tools (02:00) - Executive Problem Statement (03:40) - First and Foremost (10:45) - Recon & OSINT Tooling (19:21) - Scan & Enumerate Tooling (24:49) - Vulnerability Scanning (27:29) - Vulnerability Exploitation (31:59) - Web Applications (36:19) - Local System Tooling (38:15) - Password Spraying/Cred Abuse (41:51) - Active Directory (49:47) - Proxy Chains / SSH Tunnels (50:30) - SMB File Shares (51:47) - Kerberos Interaction (52:51) - Impacket Tools (54:16) - Pre-Windows 2000 (55:34) - Credential Relay (and LLMNR) (56:56) - ADCS Investigation & Abuse (57:29) - Browser Hijacks (58:26) - We Have a Class - Active Directory Security and Hardening (59:05) - Q&A Start (01:00:25) - How Do you Build These Skills? (01:02:20) - When Did You Start Feeling Comfortable with Your Skillset? (01:06:35) - Getting a Company to Approve Running These Tools? (01:09:02) - HIPPA Approved Tools? (01:11:18) - Training for an Organization? (01:12:35) - Finding Entry Level Jobs (01:15:10) - Closing Remarks Creators & Guests Zach Hill - Host Jordan Drysdale - Guest Meagan Bentley - Producer Kent Ickler - Guest Brought to you by:Black Hills Information Security https://www.blackhillsinfosec.comAntisyphon Traininghttps://www.antisyphontraining.com/Active Countermeasureshttps://www.activecountermeasures.comWild West Hackin Festhttps://wildwesthackinfest.comClick here to watch a video of this episode. Click here to view the episode transcript.
Comments