Offensive Countermeasures - Still Trying to Bring Sexy Back
Offered By: YouTube
Course Description
Overview
Syllabus
tenacity
Goal: Bring Sexy Back
Goal: Discussions that matte
Outline
Introduction
Successful Penetration Tests
Flimsy Defensive "Layers"
Social Engineering
Passwords
Software Vulnerabilities
John & Paul Then Thought
OODA
Case Studies
Case Study: Consent to University Network Term
Lets Pretend I'm a Lawyer
Warning Banners
Example: Eric Needed a Warning Banne
Annoyance: HoneyPorts
Annoyance: Messing with Attackers Head
Exploiting Existing Vulnerabilities
Annoyance: Setting Traps
Spider Trap & WebLabyrinth
Prevention: Nessus Example
Keeping it "Real"
Josh Wright Comments on Offensive Countermeasures...
Word Web-Bugs
How does it work?
BeEF Modules
Attribution: Decloak
Wireless Countermeasure Example
Sneak Preview: Sample "trap"
Collect Logins (and attacks!)
Attack: Java Payload
The Girl With The Dragon Tattoo
Happy Ending!
Related Courses
Building Geospatial Apps on Postgres, PostGIS, & Citus at Large ScaleMicrosoft via YouTube Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube What's New in Grails 2.0
ChariotSolutions via YouTube Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube