YoVDO

Gryffindor Pure JavaScript Covert Exploitation

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Ethical Hacking Courses Windows Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore advanced red team operations and JavaScript-based covert exploitation techniques in this 45-minute conference talk from Derbycon 2018. Delve into topics such as browser wars, the Onion Model of Security, and host-based analysis. Learn about Windows-specific vulnerabilities, network-based analysis, and system execution analysis. Discover the intricacies of Gryffindor and Prismattica tools while gaining insights into effective red team strategies and the importance of embracing failure as a learning opportunity in cybersecurity.

Syllabus

Introduction
Red Team Operations
Its OK to Lose
JavaScript
Windows
Browser Wars
AnyFire
Onion Model of Security
False Sense of Security
HostBased Analysis
NetworkBased Analysis
System Execution Analysis
Gryffindor
Prismattica


Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network