Intro to Using Defense Hacking Tools with Jordan Drysdale and Kent Ickler
E1

Intro to Using Defense Hacking Tools with Jordan Drysdale and Kent Ickler

How do you use hacking tools?

🛝 Webcast Slides
https://www.antisyphontraining.com/wp-content/uploads/2026/01/IntroToHackingTools-kent-and-jordan.pdf

🎓Antisyphon Training with Kent & Jordan at WWHF Mile High 2026:
https://www.antisyphontraining.com/product/active-directory-security-and-hardening-with-jordan-drysdale-and-kent-ickler/

Join instructors Jordan Drysdale and Kent Ickler (Black Hills Information Security – Testers) for a free one-hour training session featuring a live demonstration of hacking tools in a speed run against a messy Active Directory domain.

You’ll get a rapid-fire introduction to Jordan and Kent’s standard hacking techniques and learn strategies based on their popular Lab Building 101 framework.

Kent and Jordan will demystify how these tools work so you can feel confident using them yourself.


Chapters:
  • (00:00) - Intro - Intro to Using Defense Hacking Tools
  • (01:48) - Executive Problem Statement
  • (03:28) - First and Foremost
  • (10:33) - Recon & OSINT Tooling
  • (19:09) - Scan & Enumerate Tooling
  • (24:37) - Vulnerability Scanning
  • (27:17) - Vulnerability Exploitation
  • (31:47) - Web Applications
  • (36:07) - Local System Tooling
  • (38:03) - Password Spraying/Cred Abuse
  • (41:39) - Active Directory
  • (49:35) - Proxy Chains / SSH Tunnels
  • (50:18) - SMB File Shares
  • (51:35) - Kerberos Interaction
  • (52:39) - Impacket Tools
  • (54:04) - Pre-Windows 2000
  • (55:22) - Credential Relay (and LLMNR)
  • (56:44) - ADCS Investigation & Abuse
  • (57:17) - Browser Hijacks
  • (58:14) - We Have a Class - Active Directory Security and Hardening
  • (58:53) - Q&A Start
  • (01:00:13) - How Do you Build These Skills?
  • (01:02:08) - When Did You Start Feeling Comfortable with Your Skillset?
  • (01:06:23) - Getting a Company to Approve Running These Tools?
  • (01:08:50) - HIPPA Approved Tools?
  • (01:11:06) - Training for an Organization?
  • (01:12:23) - Finding Entry Level Jobs
  • (01:14:58) - Closing Remarks

Brought to you by:
Black Hills Information Security 

Antisyphon Training

Active Countermeasures

Wild West Hackin Fest

Episode Video

Creators and Guests

Jordan Drysdale
Guest
Jordan Drysdale
Jordan Drysdale has been with the Black Hills Information Security (BHIS) tribe since December 2015. He is a Security Analyst, as well as a member of the systems administration team. Jordan came to BHIS with a strong background, including many years in networking tech support and engineering for HP, UNi, and Managed Services — he never stops learning and sharpening his skills.
Kent Ickler
Guest
Kent Ickler
Kent started his Information Technology career working for an Internet Service Provider supporting the MidWest’s broadband initiatives of the early 2000s. His interest in technology and business operations drove his career into working for multiple Fortune 500 companies and equipping their organizational leadership with business analytical data that would support their technology initiatives. With an understanding of Information Technology, System Administration, Accounting, and Business Law, Kent has helped businesses leverage technology for competitive advantage while balancing the risks associated with today’s dynamic network environments. Kent has been with Black Hills Information Security for three years in security and administration roles.