Ferris Bueller's Guide to Abuse Domain Permutations
Offered By: Security BSides San Francisco via YouTube
Course Description
Overview
Explore techniques for both red and blue teams in this 28-minute conference talk from BSidesSF 2019. Dive into the world of domain permutation attacks, including homoglyphs, subdomains, typo-squats, and bit-squats, used by scammers to create fraudulent websites. Learn how adversaries exploit these methods for various malicious purposes, from distributing malware to corporate espionage. Discover proactive technical controls and real-time monitoring strategies to defend against these threats. Gain insights into adversary simulation techniques for red teams and comprehensive preparation, identification, containment, and eradication methods for blue teams. Understand the importance of implementing recommended technical controls to protect against attackers and avoid potential security pitfalls.
Syllabus
Intro
Trust Issues
Domain Abuse
Monitoring
Defenses
Legal Options
Taught by
Security BSides San Francisco
Related Courses
Information Security Management in a NutshellSAP Learning Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Enterprise Security Fundamentals
Microsoft via edX Planning a Security Incident Response
Microsoft via edX Introduction to Cybersecurity
Udacity