YoVDO

Ferris Bueller's Guide to Abuse Domain Permutations

Offered By: Security BSides San Francisco via YouTube

Tags

Security BSides Courses Cybersecurity Courses Incident Response Courses Adversary Simulation Courses

Course Description

Overview

Explore techniques for both red and blue teams in this 28-minute conference talk from BSidesSF 2019. Dive into the world of domain permutation attacks, including homoglyphs, subdomains, typo-squats, and bit-squats, used by scammers to create fraudulent websites. Learn how adversaries exploit these methods for various malicious purposes, from distributing malware to corporate espionage. Discover proactive technical controls and real-time monitoring strategies to defend against these threats. Gain insights into adversary simulation techniques for red teams and comprehensive preparation, identification, containment, and eradication methods for blue teams. Understand the importance of implementing recommended technical controls to protect against attackers and avoid potential security pitfalls.

Syllabus

Intro
Trust Issues
Domain Abuse
Monitoring
Defenses
Legal Options


Taught by

Security BSides San Francisco

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network