Bypassing Encryption by Attacking the Cryptosystem Perimeter
Offered By: YouTube
Course Description
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore techniques for bypassing encryption by targeting vulnerabilities in cryptosystem perimeters in this conference talk from CYPHERCON12. Delve into methods like memory dumping, process injection, and backdooring SSH. Learn about exploiting password managers, creating DLL shells, and leveraging custom JavaScript for attacks. Gain insights on defending against these perimeter-based cryptographic vulnerabilities and strengthening overall system security.
Syllabus
Intro
Memory Dump
Process Injection
Manhook
Backdoor
SSH
Keepass
DLL Shell
Calebs Hack
Custom JavaScript
What to do
Related Courses
Breaking the Teeth of Bluetooth PadlocksYouTube Closing Keynote Lectures or Life Experiences Awareness Training that Works
YouTube Do You Want Educated Users Because This is How You Get Educated Users
YouTube Don't Blame That Checklist for Your Crappy Security Program
YouTube Managing Your MSSP
YouTube