POPULARITY
Peter Sippell is part of Veris Group, which employs over 400 surveyors and planners across Australia. Peter shares about the many opportunities that there are in surveying, especially through embracing... The post Chapter 12: Peter Sippell appeared first on GlobalX Terrain.
In this episode: Robb was under the weather so Steve Knight, Senior Director with Kaiser Permanente, sat in as co-host for the news. Robb sat down with DISH Networks CISO John Everson. Plus news from CyberGRX, Coalfire, LogRhythm, Google, and an imposter at Denver Health. John Everson dishes on Security This week we welcome guest co-host Steve Knight. Steve is Senior Director of Risk Solutions and Innovation at Kaiser Permanente. A number of AWS services have now been FedRAMP certified by Coalfire/Veris. CyberGRX gets another $20M in funding to continue their growth. LogRhythm is putting out a series of security awareness posters and the first one is on passwords. Denver Health had an issue the reminds us that physical security can't be taken for granted. Google published an ebook on their standards for tiered access as part of their BeyondCorp project. Sign up for our mailing list on the main site to receive weekly updates - https://www.colorado-security.com/. We're continually working to improve the show, and appreciate the feedback we get from our listeners. If you discover any audio issues, or have suggestions for our format, let us know. This week's episode is available on Soundcloud, iTunes and the Google Play store. Reach out with any questions or comments to info@colorado-security.com Feature interview: John Everson is the CISO for DISH Network and sits down with Robb to talk about his journey. Local security news: Veris Group, Recently Acquired by Coalfire, Completes FedRAMP High JAB Assessment of Additional AWS GovCloud (US) Services Denver cybersecurity startup CyberGRX hits a nerve, attracts $20 million in round led by Silicon Valley VC Free Security Awareness Posters (You’ll Actually Want to Use) Woman posed as medical student at Denver Health to treat patients Mobility best practice in connected workspaces: tiered access at Google Startups no more? Jobs, funding on the rise for Denver’s maturing tech scene Job Openings: Ball Aerospace - Network Security Administrator II CHI - Senior Compliance Specialist Oppenheimer Funds - Cyber Security Manager Identity and Access Kaiser - Executive Director, Cyber Identity and Access Management Palo Alto Networks - CyberSecurity Manager CSS Denver Arrow Electronics - Information Security Architect I KPMG - Director, Cyber Security Services COBiz Financial - IT Senior Risk Analyst Upcoming Events: This Week's Events: AWS Security - Automating Security in the Cloud - 4/25-26 SecureSet - Capture the Flag - 4/28 ISSA COS - Mini Seminar - 4/29 Notable Upcoming Events: Rocky Mountain Information Security Conference (RMISC) 5/9-11 Denver BSides 5/12-13 ISSA COS Security+ Trainings (6/3 + 6/10) 7th Annual Cyber Security Training & Technology Forum 8/30-31 View our events page for a full list of upcoming events If you have any questions or comments, or any organizations or events we should highlight, contact Alex and Robb at info@colorado-security.com * Thanks to CJ Adams for our intro and exit! If you need any voiceover work, you can contact him here at carrrladams@gmail.com. Check out his other voice work here. * Intro and exit song: "The Language of Blame" by The Agrarians is licensed under CC BY 2.0
Jared Atkinson is the Hunt Capability Lead with Veris Group’s Adaptive. Passionate about PowerShell and the Open Source community, Jared is the lead developer of the PowerForensics project, an open source forensics framework for PowerShell, and maintains a DFIR focused blog.
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Schroeder/DEFCON-22-Will-Schroeder-Veil-Pillage-Post-Exploitation-2.0.pdf Veil-Pillage: Post-exploitation 2.0 Will Schroeder SECURITY RESEARCHER, VERIS GROUP The Veil-Framework is a project that aims to bridge the gap between pentesting and red team toolsets. It began with Veil-Evasion, a tool to generate AV-evading payload executables, expanded into payload delivery with the release of Veil-Catapult, and branched into powershell functionality with the release of Veil-PowerView for domain situational awareness. This talk will unveil the newest additional to the Veil-Framework, Veil-Pillage, a fully-fledged, open-source post-exploitation framework that integrates tightly with the existing framework codebase. We’ll start with a quick survey of the post-exploitation landscape, highlighting the advantages and disadvantages of existing tools. We will cover current toolset gap areas, and how the lack of a single solution with all the options and techniques desired drove the development of Veil-Pillage. Major features of the framework will be quickly detailed, and the underlying primitives that modules build on will be explained. Veil-Pillage, released immediately following this presentation, makes it easy to implement the wealth of existing post-exploitation techniques out there, public or privately developed. Currently developed modules support a breadth of post-exploitation techniques, including enumeration methods, system management, persistence tricks, and more. The integration of various powershell post-exploitation components, assorted methods of hashdumping, and various ways to grab plaintext credentials demonstrate the operational usefulness of Veil-Pillage. The framework utilizes a number of triggering mechanisms with a preference toward stealth, contains complete command line flags for third-party integration, and has comprehensive logging and cleanup script capabilities. Welcome to Veil-Pillage: Post-Exploitation 2.0. Will Schroeder (@harmj0y) is a security researcher and pentester/red-teamer for Veris Group, and is one of the co-founders and active developers of the Veil-Framework, a project aimed at bridging the gap between pentesting and red-team toolsets. Will recently presented at Shmoocon ‘14 on AV-evasion and custom payload delivery methods utilizing tools he developed, Veil-Evasion and Veil-Catapult. He has presented at various BSides events on the Cortana attack scripting language and obfuscated Pyinstaller loaders. He is also the author of Veil-PowerView, a tool for gaining situational awareness on Windows domains, and is an active powershell hacker. A former national lab security researcher, he is happy to finally be in the private sector. twitter: @harmj0y