YoVDO

Information Gathering and Social Media Attacks to Gain Access

Offered By: YouTube

Tags

SkyDogCon Courses Cybersecurity Courses Ethical Hacking Courses Digital Forensics Courses Information Gathering Courses Man in The Middle Attacks Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore information gathering techniques and social media attacks in this 35-minute conference talk from SkyDogCon 2011. Delve into the Evil Twin Attack, its origins, and mechanics through practical examples. Learn about creating fake LinkedIn accounts for information gathering, including profile creation and connecting individuals. Examine social media attack strategies, focusing on Facebook takeovers using tools like Firesheet and Firesheep. Discover social media tools like MarketMe and gain insights into enhancing social media security. Conclude with a discussion on the importance of documentation and contact information in cybersecurity.

Syllabus

Intro
Evil Twin Attack
The Evil Twin Attack
How this got started
How it works
Example
Information gathering
Fake LinkedIn accounts
LinkedIn information gathering
LinkedIn pictures
Linking people together
Filling out the profile
Social media attacks
Documentation
Evil Twin
Man in the Middle
Tools needed
Firesheet
Firesheep
Taking over Facebook
Social media tools
Marketme
Social Media Security
Contact Info


Related Courses

Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam
Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax
MSc Cyber Security
Coventry University via FutureLearn
Network Security - Introduction to Network Security
New York University (NYU) via edX
Network Security - Advanced Topics
New York University (NYU) via edX