Empirical Exploitation
Offered By: BSidesLV via YouTube
Course Description
Overview
Explore empirical exploitation techniques in this 45-minute conference talk by H.D. Moore at BSidesLV 2012. Delve into quantifying security research, examining the society of walled gardens, and analyzing various cyber threats including DDoS attacks, BOTS Trojans, and spam. Learn about blacklists, whitelists, and measuring techniques. Discover insights on Internet mass TCP scanning, URL analysis, and UDP ISP email practices. Investigate top 100 ports, service data, and basic statistics. Examine specific technologies and protocols such as VxWorks, MDNS, VNC, NetBIOS, and Cisco IOS. Gain knowledge on unique MAC addresses, STP, and portable security tools in this comprehensive exploration of empirical exploitation methodologies.
Syllabus
Intro
Quantifying Security Research
Society of walled gardens
DDoS attack
BOTS Trojans
Spam
Blacklists
Whitelists
Measuring
Showing Ins
Scanning
Internet Mass
TCP Scanning
URLs
UDP
ISP
Email
Top 100
Shiny Clock
Fancy Clock
Storage
IO
Fun Ports
Service Data
Basic Stats
VXWorks
MDNS
MDNS Devices
Cell Bioinstrument
VNC
My Sequel
NetBIOS
Unique MAC Addresses
STP
Cisco routers
Cisco IOS
Portable Mia
Taught by
BSidesLV
Related Courses
Security Principles(ISC)² via Coursera A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera FinTech for Finance and Business Leaders
ACCA via edX Access Control Concepts
(ISC)² via Coursera Access Controls
(ISC)² via Coursera