Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27
Introduction
00:00 • 2min
Is There a Debate Around Offense Security Tools?
01:45 • 3min
Is Open Source a Net Bad?
04:40 • 6min
Is There a Right or a Wrong?
10:20 • 3min
Open Source Tooling
13:22 • 2min
Red Teaming and Detection Engineering - What's the Output?
15:16 • 2min
Is There a Jehari Window?
17:04 • 5min
Open Source Tooling Is Bad, Bro?
21:59 • 2min
Open Source Defensive Capabilities
23:45 • 4min
Is It Worth It? Or Is It the Capabilities Abundance?
27:58 • 5min
Can I Create Schedule Tasks Through Power Shell?
32:42 • 1min
Is There a Difference Between Dynamic and Static Analysis?
34:10 • 4min
Should I Release Defensive Capabilities?
38:09 • 2min
The Fundamental Aspect of the Abbreviation Map
40:00 • 5min
I'm Getting Too Far, Right?
45:30 • 4min
The Juice Isn't Worth the Squeeze
49:15 • 3min
Detecting a Credential Dumping From Elsas
52:03 • 4min
Securable Objects on the Windows Operating System
55:46 • 2min
Can You Detect All Curbrosting?
58:10 • 3min
Is There So Much That Can Be Done in Detection Engineering?
01:01:22 • 5min
How Do I Detect All Services?
01:06:52 • 6min
What Makes Something Malicious?
01:12:52 • 5min
Is the Service Desecrated Remotely?
01:17:40 • 2min
Detection Engineering - You Don't Want to Look at Every Ten, Right?
01:19:54 • 2min
Detection Engineer - I Hate That I'm About to Say This
01:22:06 • 4min
Is There a Way to Reduce False Negatives?
01:26:00 • 5min
The Dutis Off the Walls
01:30:46 • 3min


