Much Ado About Credential Stuffing - CarolinaCon 2019 Preview
Offered By: Cyber Mentor via YouTube
Course Description
Overview
Explore the world of credential stuffing in this 25-minute conference talk preview for CarolinaCon 2019. Delve into the concept of credential stuffing, its impact on cybersecurity, and real-world examples that highlight its prevalence. Learn about the common themes in credential stuffing attacks and discover effective prevention strategies. Gain valuable insights for both red teamers and cybersecurity professionals looking to enhance their understanding of this critical security issue.
Syllabus
Introduction
Red Teamers
What is credential stuffing
Story time
Calling the IT manager
Calling the internal access
The common theme
Prevention
Taught by
The Cyber Mentor
Related Courses
Web App Testing - EnumerationCyber Mentor via YouTube Full Ethical Hacking Course - Beginner Network Penetration Testing
Cyber Mentor via YouTube Zero to Hero Pentesting - Exploitation, Shells, and Some Credential Stuffing
Cyber Mentor via YouTube Top Active Directory Attacks - Understand, then Prevent and Detect
RSA Conference via YouTube Protecting Accounts from Credential Stuffing with Password Breach Alerting
USENIX via YouTube