March 3, 2020
                    
                
                
            
            [44Con Announce] Woooah, We're halfway there
            
            
            
                
                    |IF:MC_PREVIEW_TEXT|
[if !gte mso 9]>|MC_PREVIEW_TEXT|
 | 
 
 | 
 
| Try viewing this email in your browser | 
 
 
 | 
 
 
 | 
end header bar
header left
 | 
 
| 
 | 
 
 | 
 
| Wooah, We're half way there | 
 
 | 
 
| Woah-oh, Early birds are rare! | 
 
 | 
 
 
 | 
 | 
 
 | 
 
| 44CONnect March | 
 
| 
 | 
 
 | 
 
| An excellent lineup including talks on RFID Hacking, a 44CON invite-only alpha and more. | 
 
 | 
 
| 
 | 
 
 | 
 
 
 | 
 
 
 | 
 
 | 
 
 
 | 
 | 
 
 
 | 
 
 | 
 
| Early Birds Selling Out | 
 
 | 
 
| We're down to about 20 Early bird tickets, but expect them to sell out over the course of this month. Remember: Once they're gone, they're gone! | 
 
 | 
 
| 
 | 
 
 
 
 | 
 
 | 
 
| ICYMI: AD Password Audit | 
 
 | 
 
| James Tusini from Safepass.me writes about the benefits and drawbacks of different approaches to auditing Active Directory for pwned passwords. | 
 
 | 
 
| 
 | 
 
 
 | 
 
 | 
 
 
 | 
 | 
 
| 
 | 
 
 | 
 
| Training Spotlight: GLIBC HeapLAB | 
 
 | 
 
| Seats are still available for Max Kamper's GLIBC Heap exploitation lab course. | 
 
 | 
 
 
 | 
 | 
 
 
 | 
 
 | 
 
| HeapLAB Taster December Workshop | 
 
 | 
 
| Watch and learn with Max Kamper as he walks through the House of Force and Fastbin Dup techniques for exploiting GLIBC vulnerabilities. | 
 
 | 
 
| 
 | 
 
 
 
 | 
 
 | 
 
| Want The Workshop VMs? Book The Course! | 
 
 | 
 
| If you've enjoyed the video, Max has over 9 other techniques to teach you as well as House of Force and Fastbin Dup over 2 days this March in London. | 
 
 | 
 
| 
 | 
 
 
 | 
 
 | 
 
 
 | 
 | 
 
| 
 | 
 
 | 
 
| STUFF WE LOVED THIS WEEK | 
 
 | 
 
| The Best Of The Last Week's Reading | 
 
 | 
 
 
 | 
 | 
 
 
 | 
 
 | 
 
| Silver And Golden Tickets | 
 
 | 
 
| Hackndo talks about Silver and Golden Tickets, Kerberos,  PAC and how it comes together in Microsoft's AD. | 
 
 | 
 
| 
 | 
 
 
 
 | 
 
 | 
 
| RedELK: A Red Team SIEM | 
 
 | 
 
| Get the nod when you're being watched by the blue team, and improve long-term operational usability and accountability. | 
 
 | 
 
| 
 | 
 
 
 
 | 
 
 | 
 
| Real Intelligence Threat Analytics | 
 
 | 
 
| This handy tool from Black Hills and Active Countermeasures detects beacons and DNS tunnelling via Zeek logs. | 
 
 | 
 
| 
 | 
 
 
 | 
 
 | 
 
 
 | 
end header left
1/2 right 1
end 1/2 right 1
1/2 left 1
end 1/2 left 1
cta
end cta
headline
end headline
1/1 panel
end 1/1 panel
2/2 content
end 2/2 content
3/3 content
end 3/3 content
2/2 panel
end 2/2 panel
3/3 panel
end 3/3 panel
profile
end profile
contact
end contact
1/2 left 2
end 1/2 left 2
1/2 right 2
end 1/2 right 2
header right
end header right
content right
end content right
content left
end content left
quote
end quote
1/3 left
end 1/3 left
1/3 right
end 1/3 right
 1/1 content 
 end 1/1 content 
footer