#bhusa

Josh Grossman (tghosth👻) :verified:JoshCGrossman@infosec.exchange
2025-06-24

Pulled last year's class workbook out so that I can prepare the updated version for this year.

You still have time to sign up for my updated course at @BlackHatEvents #BHUSA, in person in Las Vegas, August 4-5.

Sign-up here:
blackhat.com/us-25/training/sc

More information about the course:
bouncesecurity.com/training/ac

2025-06-02

Heading to @blackhatevents and haven't found a course? Advanced Threat Emulation: Active Directory will take students through hands-on exercises attacking a real-world emulated network. Don't miss out! #BHUSA #RedTeam #Cybersecurity
Aug 2-3: blackhat.com/us-25/training/sc
Aug 4-5: blackhat.com/us-25/training/sc

2025-05-28
2025-05-23

Last chance: today is the final day to get Early Bird pricing for all @blackhatevents courses. Prices go up after tonight.

Register today before prices increase:
blackhat.informafestivals.com/

Join us for:

Advanced Threat Emulation: Active Directory
Hands-on training in Kerberos abuse, credential dumping, and multi-domain compromise.
Aug 2–3: blackhat.com/us-25/training/sc
Aug 4–5: blackhat.com/us-25/training/sc

Advanced Threat Emulation: Evasion
Learn how to evade EDR, obfuscate payloads, and stay stealthy in real-world lab environments.
Aug 2–3 and Aug 4–5 (same links as above)

Aviation Systems & ICS Security Bootcamp
Four days of hands-on ICS and aviation security, from MIL-STD-1553 to PLC exploitation.
Aug 2–5: blackhat.com/us-25/training/sc

#BHUSA #CyberSecurity #RedTeam

2025-05-20

Heads up! Prices for all courses at @blackhatevents go up on May 23rd. Lock in your spot now before the end of Early Bird pricing!

Join us at Black Hat USA for Advanced Threat Emulation: Active Directory. This hands-on course dives into AD attacks, Kerberos abuse, credential dumping, and multi-domain compromise using real-world tools and labs.
Aug 2-3: blackhat.com/us-25/training/sc
Aug 4-5: blackhat.com/us-25/training/sc

Sharpen your tradecraft at Black Hat USA with Advanced Threat Emulation: Evasion. Learn how to bypass EDR, obfuscate payloads, evade logging, and extend tool lifespan—all through hands-on labs.
Aug 2-3: blackhat.com/us-25/training/sc
Aug 4-5: blackhat.com/us-25/training/sc

Explore ICS and aviation system security in our Aviation Systems & ICS Security Bootcamp at Black Hat USA. From MIL-STD-1553 to PLC exploitation, this four-day course delivers hands-on training in securing critical infrastructure.
Aug 2-5: blackhat.com/us-25/training/sc

#BHUSA #CyberSecurityTraining #RedTeam

blackhat.informafestivals.com/

2025-05-18

Super excited to have LORIS, a stateful analysis and fuzzing framework for commercial baseband firmware, accepted at BlackHat this year. See you all in Las Vegas! #BHUSA, @blackhatevents

🚀 Exciting News! 🚀

I'm thrilled to announce that our talk, "Burning, Trashing, Spacecraft Crashing: A Collection of Vulnerabilities That Will End Your Space Mission," has been accepted for Black Hat USA 2025!

Link to the abstract: lnkd.in/espb_dAq

Over the past year, we've uncovered some eye-opening vulnerabilities and exploits that could change the way you think about space mission security. We can't wait to share our findings with the community and spark important conversations about the future of cybersecurity in space.

Hope to see you in Vegas!

#BlackHatUSA #SpaceSecurity #Cybersecurity #Infosec
#BHUSA #space #hacking #security

2025-05-14

I'm thrilled to announce "HTTP/1 Must Die! The Desync Endgame", at #BHUSA! This is going to be epic, check out the abstract for a teaser:

Michael Bargurymbrg@infosec.exchange
2025-05-12

its been 9 months since #BHUSA and living off microsoft copilot

ppl have been asking if things are better now

well.. they are much better. but for whom? 😈😈😈

catch the sequel at hacker summer camp featuring very disturbing shenanigans
@tamirishaysh

@blackhatevents

AI enterprise compromise with 0click exploits at BHUSA
2025-05-09

Think your tools are stealthy? Think again. This course teaches how to break detection, unhook APIs, bypass ETW/AMSI, and weaponize obfuscation like top-tier APTs. If you're not evading, you're just noisy. Meet us at @blackhatevents! #RedTeam #MalwareDev #CyberSecurity #BHUSA #Obfuscation

blackhat.com/us-25/training/sc

2025-05-07

Why I was prodding for an Etruscan #witch.

blackhat.com/us-25/briefings/s

My talk on haruspicy (when it comes to picking signal out of the guts of vuln scoring systems) was accepted at #BHUSA. Which is pretty neat. But I want to fill out the liver divination part just a little more. :)

2025-05-07

Don’t miss our Active Directory course at @blackhatevents! Master techniques for infiltrating Windows Domains and put your skills to the test in an immersive hands-on lab environment. #Pentest #RedTeam #ActiveDirectory #BHUSA #Cybersecurity

blackhat.com/us-25/training/sc

2025-04-23

Master ICS & aviation cybersecurity at @blackhatevents . Dive into real-world attacks on bus protocols, & defense strategies. Led by @_hubbl3 , come learn from his experience conducting F-22 testing, aggressor ops & secure aircraft design at Boeing Phantom Works #BHUSA #cybersecurity
blackhat.com/us-25/training/sc

2025-04-22

@blackhatevents is coming up and we can't wait to see you there! Join us for Advanced Threat Emulation: Active Directory and coerce your way to admin. Early Bird pricing ends May 23rd!
#ActiveDirectory #Cybersecurity #RedTeam #BHUSA

blackhat.com/us-25/training/sc

2025-04-16

Blue Team been oddly attentive recently? Take your evasion skills to the next level in Advanced Threat Emulation: Evasion. Enjoy hands-on exercises, personal ranges, and lifetime access to the course material. @BlackHatEvents Early Bird pricing ends May 23rd!
#RedTeam #BHUSA #Cybersecurity
blackhat.com/us-25/training/sc

Josh Grossman (tghosth👻) :verified:JoshCGrossman@infosec.exchange
2025-03-24

This year should hopefully be the 3rd year that I train at @BlackHatEvents #BHUSA and also at @owasp #AppSecEU?

But how did I get to this stage?

The short answer is a lot of thought and hard work.

And the long answer?

Well I thought I'd write some thoughts down...

🧵 1/x

Josh Grossman (tghosth👻) :verified:JoshCGrossman@infosec.exchange
2025-03-18

At @BlackHatEvents #BHUSA on 4-5 Aug in Las Vegas, you can attend "Accelerated AppSec: Hacking your Product Security Programme for Velocity and Value".

This course helps you build a successful programme to bridge the gap between developers and security, without losing speed.
4/5

Josh Grossman (tghosth👻) :verified:JoshCGrossman@infosec.exchange
2025-03-18

For the third year running, I am going to be delivering application security training at both @owasp #GlobalAppSec EU in Barcelona (26-27 May) and also @BlackHatEvents #BHUSA in Las Vegas (4-5 Aug) and I am super excited!

Want to hear more? Keep reading...
1/5

Josh Grossman (tghosth👻) :verified:JoshCGrossman@infosec.exchange
2025-03-11

At @BlackHatEvents #BHUSA on 4-5 Aug in Las Vegas, you can attend "Accelerated AppSec: Hacking your Product Security Programme for Velocity and Value".

This course helps you build a successful programme to bridge the gap between developers and security, without losing speed.
4/5

Josh Grossman (tghosth👻) :verified:JoshCGrossman@infosec.exchange
2025-03-11

For the third year running, I am going to be delivering application security training at both @owasp #GlobalAppSec EU in Barcelona (26-27 May) and also @BlackHatEvents #BHUSA in Las Vegas (4-5 Aug) and I am super excited!

Want to hear more? Keep reading...
1/5

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst