Главная
Study mode:
on
1
Intro
2
Quantifying Security Research
3
Society of walled gardens
4
DDoS attack
5
BOTS Trojans
6
Spam
7
Blacklists
8
Whitelists
9
Measuring
10
Showing Ins
11
Scanning
12
Internet Mass
13
TCP Scanning
14
URLs
15
UDP
16
ISP
17
Email
18
Top 100
19
Shiny Clock
20
Fancy Clock
21
Storage
22
IO
23
Fun Ports
24
Service Data
25
Basic Stats
26
VXWorks
27
MDNS
28
MDNS Devices
29
Cell Bioinstrument
30
VNC
31
My Sequel
32
NetBIOS
33
Unique MAC Addresses
34
STP
35
Cisco routers
36
Cisco IOS
37
Portable Mia
Description:
Explore empirical exploitation techniques in this 45-minute conference talk by H.D. Moore at BSidesLV 2012. Delve into quantifying security research, examining the society of walled gardens, and analyzing various cyber threats including DDoS attacks, BOTS Trojans, and spam. Learn about blacklists, whitelists, and measuring techniques. Discover insights on Internet mass TCP scanning, URL analysis, and UDP ISP email practices. Investigate top 100 ports, service data, and basic statistics. Examine specific technologies and protocols such as VxWorks, MDNS, VNC, NetBIOS, and Cisco IOS. Gain knowledge on unique MAC addresses, STP, and portable security tools in this comprehensive exploration of empirical exploitation methodologies.

Empirical Exploitation

BSidesLV
Add to list
0:00 / 0:00