Главная
Study mode:
on
1
Intro
2
Who am I
3
Cost of data breach
4
Data Breaches
5
Windows XP
6
How do companies know theyve been hacked
7
Zeroday vulnerabilities
8
Manual hijacking
9
Driveby downloads
10
Ad networks
11
We are not invincible
12
Stop shaming companies
13
Assumptions
14
caveats
15
user IDs
16
substitution dash
17
why bother
18
Set User ID
19
Sticky
20
Setuid
21
Run as root
22
Run as system admin
23
TCP dump
24
EchoDe
25
Password
26
Shell Swap
27
Red Team Field Manual
28
PFsense
29
Fixing
30
File Integrity
31
OpenScab
32
Stateless machines
33
Security is the enemy
34
Do they believe their network has been penetrated
35
Heartbleed
Description:
Explore the critical aspects of cybersecurity and network vulnerabilities in this 38-minute conference talk from SecureWV 2015. Delve into topics such as data breaches, zero-day vulnerabilities, manual hijacking, and drive-by downloads. Examine the challenges faced by companies in detecting hacks and the importance of avoiding victim-blaming. Investigate user ID security, root access risks, and tools like TCP dump and Echo. Learn about red team strategies, PFsense implementation, and the concept of stateless machines. Gain insights into file integrity, OpenScab, and the complexities of network penetration detection, including the infamous Heartbleed vulnerability.

Wolf in Shell's Clothing - Why You Should Be Skeptical of Your Trusted Tools

Add to list
0:00 / 0:00