Hackers Demonstrate a Ransomware Attack
Offered By: SecurityFWD via YouTube
Course Description
Overview
Observe a comprehensive demonstration of a ransomware attack in this 1-hour 10-minute video from SecurityFWD. Follow along as Killian showcases a new ransomware attack lab simulation, revealing how real ransomware operates and effective countermeasures. Gain insights into various stages of the attack, including Metasploit setup, phishing emails, command and control, target machine exploitation, password spraying, ticket harvesting, and hash cracking. Learn about sensitive data identification, ransomware deployment, and crucial defense strategies. The video also covers related topics such as programming languages, anti-virus software, virtual machines for labs, zip bombs, hacker ethics, and malware honeypots, providing a comprehensive overview of cybersecurity concepts and practices.
Syllabus
Countdown
Intro
Null Byte Cat Cameo
What We're Doing Today
Metasploit and Attack Setup
Phishing E-mail
Command and Control
Exploiting the Target Machine
Reverse DNS Look-ups
Password Spray
Ticket Harvesting Attack
Hash Cracking
We Have the Password, Now What?
Finding the most Sensitive Data
Launching the Ransomeware
Defending Against this Attack
What did Kilian Study
Kody uses a Macbook
Best Programming Languages
Anti-virus
What VM do we use for the Labs
Zip Bomb
Hacker Ethics
Malware Honeypots
Closing Thoughts
Taught by
SecurityFWD
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network