The year is 2022, and I can finally take the notorious AWE (Advance Windows Exploitation) class from
@Offsectraining
. But, of course, with outstanding lectures comes the hardware to back it up. So, here is my setup for this year's
@BlackHatEvents
,
@Defcon
, and
@BSidesLV
Conf.
What's the purpose of posting this? It has the capability to effectively launch a DDOS notification attack on any iOS device, rendering it nonfunctional. Even if the device is in airplane mode, it's still susceptible. Apple should consider implementing safeguards to mitigate.
@coffeegist
I concur with your perspective. It is indistinguishable from a typical BSides gathering. In my opinion, attending would be a delightful experience, but I am indifferent to the possibility of not being able to attend. The same cannot be said for Defcon or Blackhat, however.
@jasonhillva
Many organizations have different meanings for pentest/red team. One reoccurring difference I notice between most: Red team focuses on active directory landscape, while pentest follows the web/network exploitation.
@_wald0
@GossiTheDog
@jformacek
100%, same could be said about CVEs/0-Days. Can’t collect any because of the Job. Only if we can flex on those patches/changelog instead.