YoVDO

Empirical Exploitation

Offered By: BSidesLV via YouTube

Tags

Security BSides Courses Cybersecurity Courses Network Security Courses Bots Courses DDoS Attacks Courses

Course Description

Overview

Explore empirical exploitation techniques in this 45-minute conference talk by H.D. Moore at BSidesLV 2012. Delve into quantifying security research, examining the society of walled gardens, and analyzing various cyber threats including DDoS attacks, BOTS Trojans, and spam. Learn about blacklists, whitelists, and measuring techniques. Discover insights on Internet mass TCP scanning, URL analysis, and UDP ISP email practices. Investigate top 100 ports, service data, and basic statistics. Examine specific technologies and protocols such as VxWorks, MDNS, VNC, NetBIOS, and Cisco IOS. Gain knowledge on unique MAC addresses, STP, and portable security tools in this comprehensive exploration of empirical exploitation methodologies.

Syllabus

Intro
Quantifying Security Research
Society of walled gardens
DDoS attack
BOTS Trojans
Spam
Blacklists
Whitelists
Measuring
Showing Ins
Scanning
Internet Mass
TCP Scanning
URLs
UDP
ISP
Email
Top 100
Shiny Clock
Fancy Clock
Storage
IO
Fun Ports
Service Data
Basic Stats
VXWorks
MDNS
MDNS Devices
Cell Bioinstrument
VNC
My Sequel
NetBIOS
Unique MAC Addresses
STP
Cisco routers
Cisco IOS
Portable Mia


Taught by

BSidesLV

Related Courses

Network Security
Georgia Institute of Technology via Udacity
Real-Time Cyber Threat Detection and Mitigation
New York University (NYU) via Coursera
Teaching Impacts of Technology: Global Society
University of California, San Diego via Coursera
DDoS Attacks and Defenses
University of Colorado System via Coursera
The Ethical Hacking Starter Kit: 12 Techniques
Udemy