The Attackers Dictionary
Offered By: YouTube
Course Description
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the world of cybersecurity and attacker behavior in this 47-minute conference talk from OISF 2016. Delve into topics such as auditing credential criminal attacks, Project Sonar, and low-interaction honeypots with Heisenberg. Examine Remote Desktop Protocol (RDP) endpoints and attacker sources while learning about password complexity and lifetime measurements. Discuss the legal implications and ethical considerations of actively scanning the Internet and testing suspect credentials. Analyze the National Exposure Index and challenge your understanding of correlation versus causation. Gain insights into the mindset of bad actors and their hacking capabilities, ultimately enhancing your knowledge of cybersecurity threats and defense strategies.
Syllabus
Intro
Alternative Talk Titles
Auditing Credential Criminal Attacks
Project Sonar
Introducing Heisenberg: Low interaction Honeypots
Project Heisenberg
RDP: Remote Desktop Protocol
RDP Endpoints (Relevant XKCD: 1138)
Attacker Sources
Measuring Password Complexity
Measuring Password Lifetimes
Chilling Effects on Research Actively scanning the Internet and testing suspect credentials is illegal
A simple hypothesis
Correlation != Causation
National Exposure Index is bom
Let's play a game!
Conclusions Bad actors aren't necessarily savvy with regards to hacking into
Related Courses
Security Principles(ISC)² via Coursera A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera FinTech for Finance and Business Leaders
ACCA via edX Access Control Concepts
(ISC)² via Coursera Access Controls
(ISC)² via Coursera