YoVDO

Ferris Bueller's Guide to Abuse Domain Permutations

Offered By: Security BSides San Francisco via YouTube

Tags

Security BSides Courses Cybersecurity Courses Incident Response Courses Adversary Simulation Courses

Course Description

Overview

Explore techniques for both red and blue teams in this 28-minute conference talk from BSidesSF 2019. Dive into the world of domain permutation attacks, including homoglyphs, subdomains, typo-squats, and bit-squats, used by scammers to create fraudulent websites. Learn how adversaries exploit these methods for various malicious purposes, from distributing malware to corporate espionage. Discover proactive technical controls and real-time monitoring strategies to defend against these threats. Gain insights into adversary simulation techniques for red teams and comprehensive preparation, identification, containment, and eradication methods for blue teams. Understand the importance of implementing recommended technical controls to protect against attackers and avoid potential security pitfalls.

Syllabus

Intro
Trust Issues
Domain Abuse
Monitoring
Defenses
Legal Options


Taught by

Security BSides San Francisco

Related Courses

Early Detection through Deception
YouTube
Hack for Show, Report for Dough - Brian King
YouTube
Blue Teamin on a Budget of Zero - Kyle Bubp
YouTube
Windows Event Logs - Zero to Hero
YouTube
Weaponizing Splunk - Using Blue Team Tools for Evil
YouTube