YoVDO

Phishing - Going from Recon to Credentials

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Phishing Courses

Course Description

Overview

Explore the intricacies of phishing attacks in this 27-minute conference talk from BSidesLV 2015. Delve into the motivations behind phishing, its definition, and historical context. Discover the types of information targeted by attackers and the various forms of phishing attacks. Learn about the phishing process, including the waiting game and reporting mechanisms. Examine phishing tools, automation techniques, and the Speed Fishing Framework. Witness a live demonstration and gain insights into future developments in the field of phishing.

Syllabus

Intro
Agenda
Why Phishing
What is Phishing
Background on Phishing
What Kind of Information Are They After
Phishing Attacks
Why Use Fishing
Fishing Process
Waiting Game
Reporting
Fishing Tools
Automation
Speed Fishing Framework
Demo
Future Work
Thank You


Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube