Главная
Study mode:
on
1
Intro
2
INTRO
3
OBLIGATORY DISCLAIMER
4
OBJECTIVES
5
KILL CHAIN - PRACTICAL EXAMPLE
6
EMAIL - GENERAL ANTI-SPAM
7
DOMAIN REGISTRATION MONITORING
8
DNS TWIST
9
PHISH / MALSPAM-ATTACHMENTS
10
PHISH / MALSPAM - REPORTING MECHANISM
11
OFFICE MACRO-ADFS
12
OFFICE MACRO-OFFICE PROTECTED VIEW
13
OFFICE MACRO-SCRIPT EXTENSIONS
14
MALICIOUS BINARY - SRP
15
MALICIOUS BINARY - BIN FIREWALLING
16
NETWORKING - EVIL LINKS & C2
17
RECENT PDF UPTICK
18
OFFICE MACRO-KILL CHAIN DEJA VU
19
PHISH - MITIGATION RECAP
20
QUESTIONS?
Description:
Explore effective and mostly free defenses against the phishing kill chain in this 36-minute conference talk from Derbycon 7. Learn about practical examples, email anti-spam techniques, domain registration monitoring, DNS twist, phishing and malspam reporting mechanisms, Office macro security, malicious binary protection, networking defenses against evil links and C2, and recent PDF threats. Gain valuable insights into mitigating various stages of phishing attacks and enhancing overall cybersecurity posture.

Mostly Free Defenses Against the Phishing Kill Chain

Add to list
0:00 / 0:00