YoVDO

Empirical Exploitation

Offered By: BSidesLV via YouTube

Tags

Security BSides Courses Cybersecurity Courses Network Security Courses Bots Courses DDoS Attacks Courses

Course Description

Overview

Explore empirical exploitation techniques in this 45-minute conference talk by H.D. Moore at BSidesLV 2012. Delve into quantifying security research, examining the society of walled gardens, and analyzing various cyber threats including DDoS attacks, BOTS Trojans, and spam. Learn about blacklists, whitelists, and measuring techniques. Discover insights on Internet mass TCP scanning, URL analysis, and UDP ISP email practices. Investigate top 100 ports, service data, and basic statistics. Examine specific technologies and protocols such as VxWorks, MDNS, VNC, NetBIOS, and Cisco IOS. Gain knowledge on unique MAC addresses, STP, and portable security tools in this comprehensive exploration of empirical exploitation methodologies.

Syllabus

Intro
Quantifying Security Research
Society of walled gardens
DDoS attack
BOTS Trojans
Spam
Blacklists
Whitelists
Measuring
Showing Ins
Scanning
Internet Mass
TCP Scanning
URLs
UDP
ISP
Email
Top 100
Shiny Clock
Fancy Clock
Storage
IO
Fun Ports
Service Data
Basic Stats
VXWorks
MDNS
MDNS Devices
Cell Bioinstrument
VNC
My Sequel
NetBIOS
Unique MAC Addresses
STP
Cisco routers
Cisco IOS
Portable Mia


Taught by

BSidesLV

Related Courses

Security Principles
(ISC)² via Coursera
A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera
FinTech for Finance and Business Leaders
ACCA via edX
Access Control Concepts
(ISC)² via Coursera
Access Controls
(ISC)² via Coursera