Navigating the
Cyber Land
Webinar Series
In-Memory Code Injection: Attacks & Detection
Episode 13 | 15 December 2021
Learn the techniques used by attackers for code injection and how to detect such hidden malicious codes using various principles, methods, and tools.
Memory Analysis using Volatility Tool
Episode 12 | 10 November 2021
This webinar will introduce you to the fundamentals of memory analysis, a crucial skill to have to investigate what has happened on a malfunctioning system.
Network Security Monitoring (NSM): From Theory to Practice
Episode 11 | 06 October 2021
Network Security Monitoring (NSM) is an essential security practice that aids effective threat hunting operations. Without completing the NSM, your security operations will definitely miss intrusions, and your threat hunting and digital forensics tasks will be daunting and chaotic.
WebApp Business Logic Vulnerabilities
Episode 10 | 25 August 2021
Explore a less-known class of web application vulnerabilities. These vulnerabilities are difficult to detect but have the highest impact. Due to that fact, we will show you how to detect the flaws in the app's design and implementation to prevent attackers to achieve their malicious goals.
Conducting OWASP-Based Web Application Security Assessment
Episode 09 | 30 June 2021
This webinar lays the basic foundation of this domain, and it will equip you with a set of tools that you will need to analyze malware statically and dynamically. If you have been interested in practical malware analysis, but you never knew from where to start, this webinar is ideal for you!
Malware Analysis: Basic Toolkit and Skillset
Episode 08 | 20 April 2021
In this webinar, we discussed and demonstrated how to perform a penetration test against an Active Directory (AD) server, in addition to the security measures that you need to implement to secure it from attacks.
Active Directory (AD) Security: Attacks and Countermeasures
Episode 07 | 11 March 2021
In this webinar, we discussed and demonstrated how to perform a penetration test against an Active Directory (AD) server, in addition to the security measures that you need to implement to secure it from attacks.
OAuth 2.0 Security: Attacks and Countermeasures
Episode 06 | 11 February 2021
This webinar starts with a general overview of what OAuth is and how it works. Then, we look at the bad practices that can lead OAuth to potentially become vulnerable and get exploited.
Inside SUNBURST: The SolarWinds Supply-Chain Attack
Episode 05 | 14 January 2021
In this session, we go through the technical details of this nefarious attack. We start with describing the initial discovery of it along with estimated and reported impact. Then, we talk about how the backdoor technically behaves and the tactics it performs to evade detection and/or sandbox analysis.
Metasploit: Fundamentals of Exploitation
Episode 04 | 10 December 2020
Metasploit is used particularly by penetration testers and red-team professionals. In this webinar, we will simplify the road to Metasploit mastery. We will tackle the fundamentals of exploitation using this world-class platform.
Privilege Escalation Attacks on Linux Systems
Episode 03 | 12 November 2020
How would you become “ROOT” on a Linux machine when you have got normal user access? This webinar covers a strategy composed of multiple techniques which can elevate your privileges on Linux systems. We explain and demonstrate different techniques on various vulnerable Capture-the-Flag (CTF) machines.
Guided Capture-the-Flag: Moonraker Machine
Episode 02 | 08 October 2020
This is a full-immersion hands-on guided hacking session. We captured the flag on the Moonraker Machine.
Auditing SSL/TLS Security of an HTTPS Website
Episode 01 | 10 September 2020
We discussed how to conduct a proper assessment of the SSL/TLS implementation on a particular website. Among other topics, you will learn the difference between weak and strong ciphers, and what vulnerabilities may exist in a given SSL/TLS version.