YoVDO

Empirical Exploitation

Offered By: BSidesLV via YouTube

Tags

Security BSides Courses Cybersecurity Courses Network Security Courses Bots Courses DDoS Attacks Courses

Course Description

Overview

Explore empirical exploitation techniques in this 45-minute conference talk by H.D. Moore at BSidesLV 2012. Delve into quantifying security research, examining the society of walled gardens, and analyzing various cyber threats including DDoS attacks, BOTS Trojans, and spam. Learn about blacklists, whitelists, and measuring techniques. Discover insights on Internet mass TCP scanning, URL analysis, and UDP ISP email practices. Investigate top 100 ports, service data, and basic statistics. Examine specific technologies and protocols such as VxWorks, MDNS, VNC, NetBIOS, and Cisco IOS. Gain knowledge on unique MAC addresses, STP, and portable security tools in this comprehensive exploration of empirical exploitation methodologies.

Syllabus

Intro
Quantifying Security Research
Society of walled gardens
DDoS attack
BOTS Trojans
Spam
Blacklists
Whitelists
Measuring
Showing Ins
Scanning
Internet Mass
TCP Scanning
URLs
UDP
ISP
Email
Top 100
Shiny Clock
Fancy Clock
Storage
IO
Fun Ports
Service Data
Basic Stats
VXWorks
MDNS
MDNS Devices
Cell Bioinstrument
VNC
My Sequel
NetBIOS
Unique MAC Addresses
STP
Cisco routers
Cisco IOS
Portable Mia


Taught by

BSidesLV

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network