Wylie Bayes
  • Home
  • Resume
  • About
  • Contact
  • PGP Key
Sign in

Building A Detection Lab With Security Onion

  • Wylie Bayes

Wylie Bayes

Oct 4, 2019

Google Docs Slides - https://docs.google.com/presentation/d/1ojFY5Jvc6M9dKXs1qSuh6UoWc2zqL6xREbojRL921bU/edit?usp=sharing

PDF Slides - https://wmfb.co/txt/SecOnion_DetectLab.pdf

Above are the slides that were presented at the Security Onion + Bsides Augusta conference on October 4th 2019.

Recorded talk on YouTube:  https://youtu.be/JOvWCQ-PHHY  

Sign up for more like this.

Enter your email
Subscribe

Bypassing MFA with Gophish and Evilginx2

Multi-factor authentication (MFA) is a widely used security measure that provides an additional layer of protection to user accounts. However, even with MFA in place, accounts can still be compromised through phishing attacks. Phishing attacks use social engineering techniques to trick users into revealing their login credentials, including the MFA
Mar 3, 2023 4 min read

Bloodhound and Kerberoasting: An Overview

Bloodhound and Kerberoasting are two important concepts in the field of cybersecurity. Bloodhound is a tool used for mapping and analyzing Active Directory (AD) environments, while Kerberoasting is an attack technique that exploits weak Kerberos service account passwords to obtain encrypted Kerberos ticket-granting tickets (TGTs). In this blog post, we
Mar 3, 2023 2 min read

Cloud Security In a Nutshell

Cloud computing has revolutionized the way organizations store, process, and manage their data. It has made computing resources more accessible, scalable, and cost-effective. However, the convenience and benefits of cloud computing come with security challenges that organizations must address to protect their data and systems. In this blog post, we
Mar 3, 2023 2 min read
Wylie Bayes © 2023
Powered by Ghost