Phishing - Going from Recon to Credentials
Offered By: YouTube
Course Description
Overview
Explore the intricacies of phishing attacks in this 27-minute conference talk from BSidesLV 2015. Delve into the motivations behind phishing, its definition, and historical context. Discover the types of information targeted by attackers and the various forms of phishing attacks. Learn about the phishing process, including the waiting game and reporting mechanisms. Examine phishing tools, automation techniques, and the Speed Fishing Framework. Witness a live demonstration and gain insights into future developments in the field of phishing.
Syllabus
Intro
Agenda
Why Phishing
What is Phishing
Background on Phishing
What Kind of Information Are They After
Phishing Attacks
Why Use Fishing
Fishing Process
Waiting Game
Reporting
Fishing Tools
Automation
Speed Fishing Framework
Demo
Future Work
Thank You
Related Courses
Building Geospatial Apps on Postgres, PostGIS, & Citus at Large ScaleMicrosoft via YouTube Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube What's New in Grails 2.0
ChariotSolutions via YouTube Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube