YoVDO

Hackers Demonstrate a Ransomware Attack

Offered By: SecurityFWD via YouTube

Tags

Ransomware Courses Cybersecurity Courses Metasploit Courses Data Protection Courses Password Cracking Courses

Course Description

Overview

Observe a comprehensive demonstration of a ransomware attack in this 1-hour 10-minute video from SecurityFWD. Follow along as Killian showcases a new ransomware attack lab simulation, revealing how real ransomware operates and effective countermeasures. Gain insights into various stages of the attack, including Metasploit setup, phishing emails, command and control, target machine exploitation, password spraying, ticket harvesting, and hash cracking. Learn about sensitive data identification, ransomware deployment, and crucial defense strategies. The video also covers related topics such as programming languages, anti-virus software, virtual machines for labs, zip bombs, hacker ethics, and malware honeypots, providing a comprehensive overview of cybersecurity concepts and practices.

Syllabus

Countdown
Intro
Null Byte Cat Cameo
What We're Doing Today
Metasploit and Attack Setup
Phishing E-mail
Command and Control
Exploiting the Target Machine
Reverse DNS Look-ups
Password Spray
Ticket Harvesting Attack
Hash Cracking
We Have the Password, Now What?
Finding the most Sensitive Data
Launching the Ransomeware
Defending Against this Attack
What did Kilian Study
Kody uses a Macbook
Best Programming Languages
Anti-virus
What VM do we use for the Labs
Zip Bomb
Hacker Ethics
Malware Honeypots
Closing Thoughts


Taught by

SecurityFWD

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network