How to Find a Company's BreakPoint - Andrew McNicol
Offered By: YouTube
Course Description
Overview
Syllabus
BreakPoint Labs
Modern Day Hacking
Agenda
Things Have Changed since the 90s
Overview
Our Methodology (High Level)
How to Go Beyond a Scan
Phishing: Planning
CEOs Reaction to Opening to Phishing Email
Phishing: Scenario
Phishing: Phishing Domains
Phishing: Finding Vulnerabilities
Phishing: Possible Scenarios
Web Application Vulnerabilities
Web App Vulns: File Inclusion
Web App Vulns: Step 3
Multicast Name Resolution Poisoning
Responder!
Enter Responder.py
Responder.py - Use Case 1 Rouge Services
Responder.py - Use Case 2 WPAD
Responder.py - Use Case 3 Analyze
Prevent Multicast Name Communication Attacks
So You Started a Scan
SMB Relay Attack Visual: Automated Process
SMB Relay Attack: Multicast Poisoning Cont.
SMB Relay Attack: Nessus Scanner Scenario
Prevent SMB Relay Attacks
Account Compromise
Acct Comp: Username Enumeration
Acct Comp: Automation Controls
Acct Comp: Weak Passwords
Acct Comp: Default and Shared
Final Thoughts and Tips
Useful Trainings & Links
Contact Us
Related Courses
Ethical HackingIndian Institute of Technology, Kharagpur via Swayam Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax MSc Cyber Security
Coventry University via FutureLearn Network Security - Introduction to Network Security
New York University (NYU) via edX Network Security - Advanced Topics
New York University (NYU) via edX