Ethical hacking

Ethical Hacking War Stories: Zero Trust, IAM & Advanced C2 Tactics

Ethical Hacking War Stories: Zero Trust, IAM & Advanced C2 Tactics

Jeff Crume and Patrick Fussell from IBM's X-Force team share a real-world ethical hacking war story, demonstrating an attack from an 'assume breach' perspective. They break down how vulnerabilities in Identity and Access Management (IAM) and legacy systems can lead to a full compromise, starting from an insider threat and escalating to domain administrator privileges through advanced C2 attacks and lateral movement.

How to Become an Ethical Hacker: Skills, Certifications, & Advice

How to Become an Ethical Hacker: Skills, Certifications, & Advice

Cybersecurity experts Jeff Crume and Patrick Fussell outline the essential skills, mindset, certifications, and career paths for aspiring ethical hackers, offering practical advice for breaking into the field of penetration testing and red teaming.

Ethical Hacking in Action: Red Teaming, Pen Testing, & Cybersecurity

Ethical Hacking in Action: Red Teaming, Pen Testing, & Cybersecurity

Explore the core tasks of ethical hacking, from vulnerability scanning to red teaming. This guide covers engagement structure, hacker methodologies, key frameworks like MITRE ATT&CK, and the essential tools for cybersecurity professionals.