YoVDO

Understanding How Public Places Introduce Additional Risks to Business - Len Noe

Offered By: YouTube

Tags

GrrCon Courses Cybersecurity Courses Risk Management Courses Command Injection Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a conference talk from GrrCON 2019 that delves into the additional risks businesses face in public spaces. Learn about various attack scenarios, including captive portals, QR code exploits, and keyboard traps. Discover how attackers can leverage simple redirects, DNS spoofing, and command injection to compromise corporate security. Gain insights into physical and mobile attack vectors, and understand the importance of security consciousness in public environments. Examine tools like Zap proxy and WHID Cactus, and their potential for data exfiltration and system control. Understand the implications of full screen capture and clipboard manipulation in public settings.

Syllabus

Intro
About Len Noe
The Art of War
MouthChecking
Scenario
Evil made attacks
Captive portals
Dropping business cards
Attack scenario
Overview
QR code
Captive portal
Zap proxy
Slide decks
Secondary VPN
Security conscious
responder
mobile attack scenario
physical attack scenario
corporate security
simple redirects
DNS spoof
Keyboard trap
Keyboard steal
Every keystroke
clipboard
psycho cat
I can extricate data
Take control
Pcap
Command Injection
Full Screen Capture
WHID Cactus
Tiny CC


Related Courses

Dance Fancybear Dance - A Study in macOS Cat Self
YouTube
Big Plane Little Plane - How Common Aviation Attacks Affect Airlines and General Aviation
YouTube
Network Exploitation of IoT Ecosystems
YouTube
Inhumane - Making Security Hard on Criminals, Easy on Everyone Else
YouTube
Deepfakes - If Anything Can Be Real, Then Nothing Is Real
YouTube