

Blueprint Live at SANSFIRE 2022: A panel with Heather Mahalik, Katie Nickels and Jeff McJunkin
Jul 14, 2022
Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21
Introduction
00:00 • 3min
What Are the Initial Access Factors That Avatars Are Using?
03:12 • 2min
How to Block Attachments?
04:58 • 5min
Is It a Good Idea to Buy a New iPhone?
09:40 • 2min
What's the Threat Model of Pegasus Spyware?
11:33 • 3min
Red Teaming
14:29 • 3min
Red Team Light vs Pentest?
17:35 • 2min
Pen Testing - Is the New Inscription Standard Still Good Enough?
20:00 • 2min
What Is a Man on the Side Attack?
22:02 • 5min
Bloodhound Is My Favorite Tool for Defenders
26:39 • 2min
Is Seat Belt a Red Team Tool?
28:51 • 2min
Dot Net, Is That Something?
30:57 • 2min
What Is Threat Intelligence?
32:59 • 2min
What to Look for in Threat Intelligence?
35:17 • 3min
Is There Any Way to Get Into Phone Traffic That's Easy?
38:01 • 3min
Honey Tokens, Honey Accounts, Credentials
41:29 • 3min
Honey Pots
44:47 • 4min
Those Are the Things They're Gonna Do, Right?
49:07 • 2min
How to Prevent Multiple Backdoors in the Red Team?
50:49 • 2min
Mobile Phone Compromises
53:10 • 2min
Do You Still Feel Impostorous?
55:20 • 3min