Gryffindor Pure JavaScript Covert Exploitation
Offered By: YouTube
Course Description
Overview
Explore advanced red team operations and JavaScript-based covert exploitation techniques in this 45-minute conference talk from Derbycon 2018. Delve into topics such as browser wars, the Onion Model of Security, and host-based analysis. Learn about Windows-specific vulnerabilities, network-based analysis, and system execution analysis. Discover the intricacies of Gryffindor and Prismattica tools while gaining insights into effective red team strategies and the importance of embracing failure as a learning opportunity in cybersecurity.
Syllabus
Introduction
Red Team Operations
Its OK to Lose
JavaScript
Windows
Browser Wars
AnyFire
Onion Model of Security
False Sense of Security
HostBased Analysis
NetworkBased Analysis
System Execution Analysis
Gryffindor
Prismattica
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network