Hijacking the Boot Process - Ransomware Style
Offered By: DefCamp via YouTube
Course Description
Overview
Explore a conference talk from DefCamp 2017 that delves into the dangerous world of ransomware targeting the boot process. Learn about the techniques used by malicious actors to hijack system startup, potentially rendering devices inoperable. Discover the implications of this attack vector and gain insights into potential defense strategies. Understand the importance of securing the boot process as part of a comprehensive cybersecurity approach. Benefit from the expertise shared at DefCamp, a leading conference on Hacking & Information Security in Central and Eastern Europe, known for bringing together security specialists, decision-makers, and developers to discuss cutting-edge topics in the field of information security.
Syllabus
DefCamp 2017 - Hijacking the Boot Process – Ransomware Style
Taught by
DefCamp
Related Courses
The Model of Post-Quantum Signature Using Verkle Tree - DefCamp - 2022DefCamp via YouTube The Anatomy of Wiper Malware - DefCamp - 2022
DefCamp via YouTube Internet Balkanization in an Era of Military Conflict - Dan Demeter - DefCamp - 2022
DefCamp via YouTube How We Analyzed and Built an Exploit PoC for CVE-2022-24086, a Magento RCE - Catalin Filip - DefCamp - 2022
DefCamp via YouTube To Log, or Not to Log! That Is the Question - DefCamp - 2022
DefCamp via YouTube