Hackers Demonstrate a Ransomware Attack
Offered By: SecurityFWD via YouTube
Course Description
Overview
Observe a comprehensive demonstration of a ransomware attack in this 1-hour 10-minute video from SecurityFWD. Follow along as Killian showcases a new ransomware attack lab simulation, revealing how real ransomware operates and effective countermeasures. Gain insights into various stages of the attack, including Metasploit setup, phishing emails, command and control, target machine exploitation, password spraying, ticket harvesting, and hash cracking. Learn about sensitive data identification, ransomware deployment, and crucial defense strategies. The video also covers related topics such as programming languages, anti-virus software, virtual machines for labs, zip bombs, hacker ethics, and malware honeypots, providing a comprehensive overview of cybersecurity concepts and practices.
Syllabus
Countdown
Intro
Null Byte Cat Cameo
What We're Doing Today
Metasploit and Attack Setup
Phishing E-mail
Command and Control
Exploiting the Target Machine
Reverse DNS Look-ups
Password Spray
Ticket Harvesting Attack
Hash Cracking
We Have the Password, Now What?
Finding the most Sensitive Data
Launching the Ransomeware
Defending Against this Attack
What did Kilian Study
Kody uses a Macbook
Best Programming Languages
Anti-virus
What VM do we use for the Labs
Zip Bomb
Hacker Ethics
Malware Honeypots
Closing Thoughts
Taught by
SecurityFWD
Related Courses
Cryptography IIStanford University via Coursera Microsoft Enterprise Mobility Suite
Microsoft via edX Social Media - What No One has Told You about Privacy
openHPI Windows 10 Features for a Mobile Workforce: Identity Management and Data Access
Microsoft via edX Health Professional Teaching Skills – Level 3 - Professionalism
University of Toronto via edX