YoVDO

Gryffindor Pure JavaScript Covert Exploitation

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Ethical Hacking Courses Windows Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore advanced red team operations and JavaScript-based covert exploitation techniques in this 45-minute conference talk from Derbycon 2018. Delve into topics such as browser wars, the Onion Model of Security, and host-based analysis. Learn about Windows-specific vulnerabilities, network-based analysis, and system execution analysis. Discover the intricacies of Gryffindor and Prismattica tools while gaining insights into effective red team strategies and the importance of embracing failure as a learning opportunity in cybersecurity.

Syllabus

Introduction
Red Team Operations
Its OK to Lose
JavaScript
Windows
Browser Wars
AnyFire
Onion Model of Security
False Sense of Security
HostBased Analysis
NetworkBased Analysis
System Execution Analysis
Gryffindor
Prismattica


Related Courses

Cybersecurity Roles, Processes & Operating System Security
IBM via Coursera
Operating Systems and Security
IBM via edX
Hacking in Practice: Intensive Ethical Hacking MEGA Course
Udemy
The Complete Cyber Security Course : Hackers Exposed!
Udemy
Learning Computer Security and Internet Safety
LinkedIn Learning