YoVDO

Wolf in Shell's Clothing - Why You Should Be Skeptical of Your Trusted Tools

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Network Security Courses Data Breaches Courses Zero-Day Vulnerabilities Courses Heartbleed Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the critical aspects of cybersecurity and network vulnerabilities in this 38-minute conference talk from SecureWV 2015. Delve into topics such as data breaches, zero-day vulnerabilities, manual hijacking, and drive-by downloads. Examine the challenges faced by companies in detecting hacks and the importance of avoiding victim-blaming. Investigate user ID security, root access risks, and tools like TCP dump and Echo. Learn about red team strategies, PFsense implementation, and the concept of stateless machines. Gain insights into file integrity, OpenScab, and the complexities of network penetration detection, including the infamous Heartbleed vulnerability.

Syllabus

Intro
Who am I
Cost of data breach
Data Breaches
Windows XP
How do companies know theyve been hacked
Zeroday vulnerabilities
Manual hijacking
Driveby downloads
Ad networks
We are not invincible
Stop shaming companies
Assumptions
caveats
user IDs
substitution dash
why bother
Set User ID
Sticky
Setuid
Run as root
Run as system admin
TCP dump
EchoDe
Password
Shell Swap
Red Team Field Manual
PFsense
Fixing
File Integrity
OpenScab
Stateless machines
Security is the enemy
Do they believe their network has been penetrated
Heartbleed


Related Courses

Cloud Data Security
University of Minnesota via Coursera
Incident Response and Recovery
(ISC)² via Coursera
Cyber Threats and Attack Vectors
University of Colorado System via Coursera
Киберугрозы и векторы атаки
University of Colorado System via Coursera
Cybersecurity in Healthcare (Hospitals & Care Centres)
Erasmus University Rotterdam via Coursera