YoVDO

Bypassing Encryption by Attacking the Cryptosystem Perimeter

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Process Injection Courses Memory Dump Analysis Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore techniques for bypassing encryption by targeting vulnerabilities in cryptosystem perimeters in this conference talk from CYPHERCON12. Delve into methods like memory dumping, process injection, and backdooring SSH. Learn about exploiting password managers, creating DLL shells, and leveraging custom JavaScript for attacks. Gain insights on defending against these perimeter-based cryptographic vulnerabilities and strengthening overall system security.

Syllabus

Intro
Memory Dump
Process Injection
Manhook
Backdoor
SSH
Keepass
DLL Shell
Calebs Hack
Custom JavaScript
What to do


Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube