SANS Offensive Operations

19.2K posts

SANS Offensive Operations banner
SANS Offensive Operations

SANS Offensive Operations

@SANSOffensive

More Offensive Than Ever #PenTest | #PurpleTeam | #RedTeam | #ExploitDev Training, Certification, and Research

The Internet Katılım Ekim 2010
580 Takip Edilen73.3K Takipçiler
SANS Offensive Operations
SANS Offensive Operations@SANSOffensive·
If you don’t understand how attackers break systems, you can’t defend them. #SEC504 is where defenders become strategists — learning real adversary tradecraft step-by-step. 🛠️ Learn more: go.sans.org/vQDGZo
SANS Offensive Operations tweet media
English
0
3
13
889
SANS Offensive Operations
SANS Offensive Operations@SANSOffensive·
AI is accelerating attackers. Join us in Arlington at #AISummit (Apr 20–21) for 2 days of talks & workshops, including a hands-on session with Andy Dennis on exploiting vulnerable apps with AI-powered tools and how attacks scale in real environments. ➡️ sans.org/u/1CNB
SANS Offensive Operations tweet media
English
0
1
12
859
SANS Offensive Operations
SANS Offensive Operations@SANSOffensive·
📢 Major update alert! Co-authored by Eric Conrad, Timothy McKenzie, and Bojan Zdrnja, now with more API exploitation, modern injection techniques, client-side attacks, AuthN/AuthZ bypass, and advanced vulnerability chaining. 🕷️ Check out the update: sans.org/sec542
SANS Offensive Operations tweet media
English
0
4
26
1.9K
SANS Offensive Operations
SANS Offensive Operations@SANSOffensive·
Major updates in SEC588: Cloud Penetration Testing teaches you to uncover risk hidden in IaC templates, CI/CD workflows, and serverless functions, before attackers weaponize your cloud automation. ☁️ Watch the course preview: sans.org/u/1Dip
SANS Offensive Operations tweet media
English
0
3
16
1.5K
SANS Offensive Operations
SANS Offensive Operations@SANSOffensive·
Red teamers: how would you break the AI in your stack? Exploit agentic systems. Abuse LLM apps. Stress-test modern AI architectures. Get hands-on at the SANS AI Cybersecurity Summit. 📍 Arlington, VA | Apr 20–21 Learn more: sans.org/u/1CNB
SANS Offensive Operations tweet mediaSANS Offensive Operations tweet mediaSANS Offensive Operations tweet mediaSANS Offensive Operations tweet media
English
0
5
16
1.1K
SANS Offensive Operations
SANS Offensive Operations@SANSOffensive·
🛰️ Tomorrow: Get a first look at SEC665: Advanced Red Team Operations. If you’re ready to go deeper into security product internals and kernel reversing, don’t miss this preview + live lab demo with Jonathan Reiter. 📅 Mar 11 | 2:30–4:30 PM ET 🔗 go.sans.org/msyoQW
SANS Offensive Operations tweet media
English
0
0
7
831
SANS Offensive Operations
SANS Offensive Operations@SANSOffensive·
New course‼️ An advanced #RedTeam training built for operators in DoD, intelligence, and enterprise environments who must continuously adapt and simulate the capabilities of advanced adversaries with precision and discipline. 🛸Learn more, go.sans.org/ljR4NW
SANS Offensive Operations tweet media
English
0
9
56
3.2K
SANS Offensive Operations
SANS Offensive Operations@SANSOffensive·
The hybrid frontier of current enterprise penetration testing is here! #SEC560 features revamped AD & Azure labs, new persistence and evasion techniques (AMSI & AppLocker Bypass), and updated Sliver & Metasploit C2 exercises. 🏹️ Check out the update: sans.org/sec560
SANS Offensive Operations tweet media
English
0
5
21
1.3K
SANS Offensive Operations
SANS Offensive Operations@SANSOffensive·
Presented at NDSS last week, #AirSnitch is a group of attacks that demonstrate weaknesses in how Wi-Fi client isolation is implemented. What’s real? What’s hype? 🤷 🛜 Watch live today: go.sans.org/mDQufx
SANS Offensive Operations tweet media
English
0
8
25
2.2K
SANS Offensive Operations
SANS Offensive Operations@SANSOffensive·
The University of California, Riverside research demonstrates how a malicious client connected to a Wi-Fi #network can bypass some isolation mechanisms with potential implications for access points hosting multiple #SSIDs with different security levels. ✍️ go.sans.org/mDQufx
SANS Offensive Operations tweet media
English
1
7
20
1.8K
SANS Offensive Operations
SANS Offensive Operations@SANSOffensive·
#AirSnitch research demonstrates techniques such as: exploiting weak binding between MAC, IP, and authentication identity, manipulating traffic flows to achieve #MitM positioning, and others that James and Larry will talk about in this webcast. ✍️ go.sans.org/mDQufx
SANS Offensive Operations tweet media
English
0
5
22
1.8K
SANS Offensive Operations
SANS Offensive Operations@SANSOffensive·
#AirSnitch is making headlines after its presentation at NDSS Symposium this week. How concerned should you actually be? Join Larry and James, authors of #SEC617: Wireless Penetration Testing and Ethical Hacking as they walk you through this research. 🛜 go.sans.org/mDQufx
SANS Offensive Operations tweet media
English
0
8
11
2.7K