How to Find a Company's BreakPoint - Andrew McNicol
Offered By: YouTube
Course Description
Overview
Syllabus
BreakPoint Labs
Modern Day Hacking
Agenda
Things Have Changed since the 90s
Overview
Our Methodology (High Level)
How to Go Beyond a Scan
Phishing: Planning
CEOs Reaction to Opening to Phishing Email
Phishing: Scenario
Phishing: Phishing Domains
Phishing: Finding Vulnerabilities
Phishing: Possible Scenarios
Web Application Vulnerabilities
Web App Vulns: File Inclusion
Web App Vulns: Step 3
Multicast Name Resolution Poisoning
Responder!
Enter Responder.py
Responder.py - Use Case 1 Rouge Services
Responder.py - Use Case 2 WPAD
Responder.py - Use Case 3 Analyze
Prevent Multicast Name Communication Attacks
So You Started a Scan
SMB Relay Attack Visual: Automated Process
SMB Relay Attack: Multicast Poisoning Cont.
SMB Relay Attack: Nessus Scanner Scenario
Prevent SMB Relay Attacks
Account Compromise
Acct Comp: Username Enumeration
Acct Comp: Automation Controls
Acct Comp: Weak Passwords
Acct Comp: Default and Shared
Final Thoughts and Tips
Useful Trainings & Links
Contact Us
Related Courses
Building Geospatial Apps on Postgres, PostGIS, & Citus at Large ScaleMicrosoft via YouTube Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube What's New in Grails 2.0
ChariotSolutions via YouTube Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube