SlideShare a Scribd company logo
Jayson E. Street,  CISSP, GSEC, GCIH, GCFA, IEM, IAM, ETC… BUSH1D0 The Art of (CYBER) WAR
Let go of my EGO Lets start out with a little about yours truly. [email_address]
Know yourself know your enemy Sun Wu (Tzu) “Ping-fa”(The Art of War) “ Thus it is said that one who knows the enemy and knows himself will not be endangered in a hundred engagements. One who does not know the enemy but knows himself will sometimes be victorious, sometimes meet with defeat. One who knows neither the enemy nor himself will invariably be defeated in every engagement!”
Contents INTRO What we are doing here Stratagem Solutions 5 Point methodology The games begin
Training VS. Teaching Tools have a shelf life a methodology doesn’t I don’t plan on teaching you how to fish. I want to teach you how to figure out where the fish are. 3,000 year old military strategy successfully applied to modern day pen-testing. Hackers don’t audit a network why are you?
Stratagems we will cover 1.Cross the sea by fooling the sky 3. Kill with a borrowed knife 5. Loot a burning house 8. Pretend to take one path while sneaking down another 12. Take the opportunity to pilfer a goat 18. Defeat the enemy by capturing their chief 21. Slough off the cicada's golden shell 29. Deck the tree with false blossoms 30. Make the host and the guest exchange roles 36. If everything else fails, retreat
5 Point Bush1d0 Methodology Recon Scanning Explore Exploit Expunge
Point #1 Recon Tools we will go over Sam Spade dnsenum metagoofil Maltego Google FEC News Sites
Point #2 Scanning Nmap Autoscan unicornscan
Point #3 Explore Nikto Httprint Grendel-scan
Point #4 Exploit Metasploit Milw0rm OSVDB
Point #5 Expunge Regedit Back Door Delete Button
Time to teach No more reading power points the rest of this class depends on how much you put into it.

More Related Content

PPTX
Game Presentation
PDF
Up close and personalised episode 11
PPT
Google to pwn4ge in 60 minutes pt2
PPT
Google to pwn4ge pt1
PPT
If A Network Falls In The Internet does it make a sound?
PPT
Infosec 4 The Home
PPT
Selling Elephant Whistles
PDF
2024 Trend Updates: What Really Works In SEO & Content Marketing
Game Presentation
Up close and personalised episode 11
Google to pwn4ge in 60 minutes pt2
Google to pwn4ge pt1
If A Network Falls In The Internet does it make a sound?
Infosec 4 The Home
Selling Elephant Whistles
2024 Trend Updates: What Really Works In SEO & Content Marketing

Recently uploaded (20)

PPTX
A Presentation on Artificial Intelligence
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Big Data Technologies - Introduction.pptx
PDF
Empathic Computing: Creating Shared Understanding
PPT
Teaching material agriculture food technology
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Modernizing your data center with Dell and AMD
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
KodekX | Application Modernization Development
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
A Presentation on Artificial Intelligence
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Big Data Technologies - Introduction.pptx
Empathic Computing: Creating Shared Understanding
Teaching material agriculture food technology
Reach Out and Touch Someone: Haptics and Empathic Computing
Modernizing your data center with Dell and AMD
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
KodekX | Application Modernization Development
Diabetes mellitus diagnosis method based random forest with bat algorithm
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Network Security Unit 5.pdf for BCA BBA.
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Encapsulation_ Review paper, used for researhc scholars
Understanding_Digital_Forensics_Presentation.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Ad
Ad

Bush1D0

  • 1. Jayson E. Street, CISSP, GSEC, GCIH, GCFA, IEM, IAM, ETC… BUSH1D0 The Art of (CYBER) WAR
  • 2. Let go of my EGO Lets start out with a little about yours truly. [email_address]
  • 3. Know yourself know your enemy Sun Wu (Tzu) “Ping-fa”(The Art of War) “ Thus it is said that one who knows the enemy and knows himself will not be endangered in a hundred engagements. One who does not know the enemy but knows himself will sometimes be victorious, sometimes meet with defeat. One who knows neither the enemy nor himself will invariably be defeated in every engagement!”
  • 4. Contents INTRO What we are doing here Stratagem Solutions 5 Point methodology The games begin
  • 5. Training VS. Teaching Tools have a shelf life a methodology doesn’t I don’t plan on teaching you how to fish. I want to teach you how to figure out where the fish are. 3,000 year old military strategy successfully applied to modern day pen-testing. Hackers don’t audit a network why are you?
  • 6. Stratagems we will cover 1.Cross the sea by fooling the sky 3. Kill with a borrowed knife 5. Loot a burning house 8. Pretend to take one path while sneaking down another 12. Take the opportunity to pilfer a goat 18. Defeat the enemy by capturing their chief 21. Slough off the cicada's golden shell 29. Deck the tree with false blossoms 30. Make the host and the guest exchange roles 36. If everything else fails, retreat
  • 7. 5 Point Bush1d0 Methodology Recon Scanning Explore Exploit Expunge
  • 8. Point #1 Recon Tools we will go over Sam Spade dnsenum metagoofil Maltego Google FEC News Sites
  • 9. Point #2 Scanning Nmap Autoscan unicornscan
  • 10. Point #3 Explore Nikto Httprint Grendel-scan
  • 11. Point #4 Exploit Metasploit Milw0rm OSVDB
  • 12. Point #5 Expunge Regedit Back Door Delete Button
  • 13. Time to teach No more reading power points the rest of this class depends on how much you put into it.