Navigating the
Cyber Land

Webinar Series

In-Memory Code Injection: Attacks & Detection

In-Memory Code Injection: Attacks & Detection

Episode 13 | 15 December 2021

Learn the techniques used by attackers for code injection and how to detect such hidden malicious codes using various principles, methods, and tools.

WATCH THE RECORDED EPISODE
Memory Analysis using Volatility Tool

Memory Analysis using Volatility Tool

Episode 12 | 10 November 2021

This webinar will introduce you to the fundamentals of memory analysis, a crucial skill to have to investigate what has happened on a malfunctioning system.

WATCH THE RECORDED EPISODE
Network Security Monitoring (NSM): From Theory to Practice

Network Security Monitoring (NSM): From Theory to Practice

Episode 11 | 06 October 2021

Network Security Monitoring (NSM) is an essential security practice that aids effective threat hunting operations. Without completing the NSM, your security operations will definitely miss intrusions, and your threat hunting and digital forensics tasks will be daunting and chaotic.

WATCH THE RECORDED EPISODE
WebApp Business Logic Vulnerabilities

WebApp Business Logic Vulnerabilities

Episode 10 | 25 August 2021

Explore a less-known class of web application vulnerabilities. These vulnerabilities are difficult to detect but have the highest impact. Due to that fact, we will show you how to detect the flaws in the app's design and implementation to prevent attackers to achieve their malicious goals.

WATCH THE RECORDED EPISODE
Conducting OWASP-Based Web Application Security Assessment

Conducting OWASP-Based Web Application Security Assessment

Episode 09 | 30 June 2021

This webinar lays the basic foundation of this domain, and it will equip you with a set of tools that you will need to analyze malware statically and dynamically. If you have been interested in practical malware analysis, but you never knew from where to start, this webinar is ideal for you!

WATCH THE RECORDED EPISODE
Malware Analysis: Basic Toolkit and Skillset

Malware Analysis: Basic Toolkit and Skillset

Episode 08 | 20 April 2021

In this webinar, we discussed and demonstrated how to perform a penetration test against an Active Directory (AD) server, in addition to the security measures that you need to implement to secure it from attacks.

WATCH THE RECORDED EPISODE
Active Directory (AD) Security: Attacks and Countermeasures

Active Directory (AD) Security: Attacks and Countermeasures

Episode 07 | 11 March 2021

In this webinar, we discussed and demonstrated how to perform a penetration test against an Active Directory (AD) server, in addition to the security measures that you need to implement to secure it from attacks.

WATCH THE RECORDED EPISODE
OAuth 2.0 Security: Attacks and Countermeasures

OAuth 2.0 Security: Attacks and Countermeasures

Episode 06 | 11 February 2021

This webinar starts with a general overview of what OAuth is and how it works. Then, we look at the bad practices that can lead OAuth to potentially become vulnerable and get exploited.

WATCH THE RECORDED EPISODE
Inside SUNBURST: The SolarWinds Supply-Chain Attack

Inside SUNBURST: The SolarWinds Supply-Chain Attack

Episode 05 | 14 January 2021

In this session, we go through the technical details of this nefarious attack. We start with describing the initial discovery of it along with estimated and reported impact. Then, we talk about how the backdoor technically behaves and the tactics it performs to evade detection and/or sandbox analysis.

WATCH THE RECORDED EPISODE
Metasploit: Fundamentals of Exploitation

Metasploit: Fundamentals of Exploitation

Episode 04 | 10 December 2020

Metasploit is used particularly by penetration testers and red-team professionals. In this webinar, we will simplify the road to Metasploit mastery. We will tackle the fundamentals of exploitation using this world-class platform.

WATCH THE RECORDED EPISODE
Privilege Escalation Attacks on Linux Systems

Privilege Escalation Attacks on Linux Systems

Episode 03 | 12 November 2020

How would you become “ROOT” on a Linux machine when you have got normal user access? This webinar covers a strategy composed of multiple techniques which can elevate your privileges on Linux systems. We explain and demonstrate different techniques on various vulnerable Capture-the-Flag (CTF) machines.

WATCH THE RECORDED EPISODE
Guided Capture-the-Flag: Moonraker Machine

Guided Capture-the-Flag: Moonraker Machine

Episode 02 | 08 October 2020

This is a full-immersion hands-on guided hacking session. We captured the flag on the Moonraker Machine.

WATCH THE RECORDED EPISODE
Auditing SSL/TLS Security of an HTTPS Website

Auditing SSL/TLS Security of an HTTPS Website

Episode 01 | 10 September 2020

We discussed how to conduct a proper assessment of the SSL/TLS implementation on a particular website. Among other topics, you will learn the difference between weak and strong ciphers, and what vulnerabilities may exist in a given SSL/TLS version.

WATCH THE RECORDED EPISODE