YoVDO

Witness the Russian Attack - Live Demos of Their Steps, Tools, Techniques

Offered By: WEareTROOPERS via YouTube

Tags

TROOPERS Courses Cybersecurity Courses cPanel Courses System Architecture Courses

Course Description

Overview

Explore a comprehensive analysis of Russian cyber attack techniques through live demonstrations. Delve into the intricate attack chain, examining methods like infecting legitimate websites, utilizing cPanel checkers, and deploying iframe agents. Gain insights into IP filtering, UTM Dashboard usage, and web inject strategies. Investigate the role of traffic manipulation, session spying, and the SocksFabric tunneling system. Learn about victim distribution patterns and engage in a Q&A session to deepen your understanding of these sophisticated cyber threats.

Syllabus

Introduction
Who are the victims
The attack chain
infecting legitimate websites
cPanel checker
iframe ER agent
iframe features
IP Filter
UTM Dashboard
Statistics
System Architecture
Web Inject
Role traffic
Session spy
How did we find them
SocksFabric
Tunneling
Conversations
Check Mail
Victim Distribution
Conclusion
QA


Taught by

WEareTROOPERS

Related Courses

Modmob Tools - Home Made Tools to Test Mobile Devices and Monitor Networks
WEareTROOPERS via YouTube
Microsoft IT - Secure Journey to IPv6-Only
WEareTROOPERS via YouTube
Introducing Faction - A Modern, Powerful, Multiplayer C2 Framework
WEareTROOPERS via YouTube
A Diet of Poisoned Fruit - Designing Implants and OT Payloads for ICS Embedded Devices
WEareTROOPERS via YouTube
Hardware Side Channel Attacks on the Cheapest
WEareTROOPERS via YouTube