<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>BSides Seattle on System Overlord</title><link>https://systemoverlord.com/tags/bsides-seattle.html</link><description>Recent content in BSides Seattle on System Overlord</description><generator>Hugo</generator><language>en-us</language><managingEditor>david@systemoverlord.com (David Tomaschik)</managingEditor><webMaster>david@systemoverlord.com (David Tomaschik)</webMaster><lastBuildDate>Sat, 20 Feb 2016 00:00:00 +0000</lastBuildDate><atom:link href="https://systemoverlord.com/tags/bsides-seattle/index.xml" rel="self" type="application/rss+xml"/><item><title>BSides Seattle</title><link>https://systemoverlord.com/2016/02/20/bsides-seattle.html</link><pubDate>Sat, 20 Feb 2016 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2016/02/20/bsides-seattle.html</guid><description>&lt;p&gt;These are just (essentially) my raw notes dumped from the talks I attended at
BSides Seattle (2015-ish). Unfortunate I developed a migraine so I only caught
the morning talks.&lt;/p&gt;
&lt;h3 id="active-directory"&gt;Active Directory&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Use scripts to dump AD&lt;/li&gt;
&lt;li&gt;Use scripts to sync with 3rd party providers&lt;/li&gt;
&lt;li&gt;Lots of story, not much technical depth&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="red-team"&gt;Red Team&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Presenter: Sean Malone, FusionX&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Types of Security Assessment&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Vulnerability Assessment
&lt;ul&gt;
&lt;li&gt;Find vulnerability&lt;/li&gt;
&lt;li&gt;Limited Scope&lt;/li&gt;
&lt;li&gt;Broad &amp;amp; Shallow&lt;/li&gt;
&lt;li&gt;Cooperates with SecOps&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Pentesting
&lt;ul&gt;
&lt;li&gt;Achieve Technical Compromise/Domain Admin&lt;/li&gt;
&lt;li&gt;Moderate Depth&lt;/li&gt;
&lt;li&gt;Techniques include Network, Application Assessment&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Red Team
&lt;ul&gt;
&lt;li&gt;Narrow Scope&lt;/li&gt;
&lt;li&gt;Whole Enterprise is In Scope&lt;/li&gt;
&lt;li&gt;Techniques include Social, Physical, Technical&lt;/li&gt;
&lt;li&gt;RT Objectives
&lt;ul&gt;
&lt;li&gt;Simulate Sophisticated Adversary&lt;/li&gt;
&lt;li&gt;Achieve &amp;ldquo;Nightmare Scenario&amp;rdquo; without detection&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Client Objectives
&lt;ul&gt;
&lt;li&gt;Understand resiliency&lt;/li&gt;
&lt;li&gt;Risk reduction, not just vulnerability count&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Effective Red Teams&lt;/p&gt;</description></item></channel></rss>