Speaker / Introduction

Anurag Srivastava

Anurag Srivastava is a Senior Consultant with EY, UK. He has more than 3 years of experience in multiple disciplines of Cyber Security and Forensics with area of proficiency in cloud, wireless & network penetration testing, application security testing, red team assessments & exploit research.

He is a computer science and engineering graduate and also possesses several industry recognized certificates such as Offensive Security Certified Expert (OSCE), Offensive Security Certified Professional (OSCP), Offensive Security Wireless Professional (OSWP), Security-Tube Linux Assembly Expert(SLAE), eLearnSecurity Certified Penetration Tester eXtreme (e-CPTX), Certified Red Team Professional (CRTP), Certified Red Team Expert (CRTE).

He also holds CREST Practitioner Security Analyst (CPSA) and CREST Registered Penetration Tester (CRT) . In his professional careers, he has been a key part of various vulnerability assessment and penetration testing assessments projects, performed and led various malware analysis and incident response engagements. He is a hobbyist exploit researcher and has been assigned with two CVE’s (CVE-2017-17932, CVE-2017-13696) for stack based buffer overflow vulnerability in applications. Apart from this he has been an active speaker in local OWASP and DEF CON Meetups.  


Basic of Red Teaming


Introduction to red teaming
July 19, 2020
06:00 PM

Things that are covered -
- what
- why
- myths
- red vs blue vs pentest
- physical security
- USB baiting
- social engineering
- how does a c2 infra look like
- Open source c2 setup & working
- basics of evasion
- lateral movement techniques
- persistence technique
- basics of AD
- exploiting public based servers
- some pro tips collected from     various sources
- resources from where you can     learn more 


Topic will be update soon:
July 26, 2020
06:00 PM

Content will be update soon!


Nothing Special to talk about. 

Talk to us

If you have anything in your mind. feel free to talk to us. we don't bite ;) Promise.

Contact Us