Главная
Study mode:
on
1
Countdown
2
Intro
3
Null Byte Cat Cameo
4
What We're Doing Today
5
Metasploit and Attack Setup
6
Phishing E-mail
7
Command and Control
8
Exploiting the Target Machine
9
Reverse DNS Look-ups
10
Password Spray
11
Ticket Harvesting Attack
12
Hash Cracking
13
We Have the Password, Now What?
14
Finding the most Sensitive Data
15
Launching the Ransomeware
16
Defending Against this Attack
17
What did Kilian Study
18
Kody uses a Macbook
19
Best Programming Languages
20
Anti-virus
21
What VM do we use for the Labs
22
Zip Bomb
23
Hacker Ethics
24
Malware Honeypots
25
Closing Thoughts
Description:
Observe a comprehensive demonstration of a ransomware attack in this 1-hour 10-minute video from SecurityFWD. Follow along as Killian showcases a new ransomware attack lab simulation, revealing how real ransomware operates and effective countermeasures. Gain insights into various stages of the attack, including Metasploit setup, phishing emails, command and control, target machine exploitation, password spraying, ticket harvesting, and hash cracking. Learn about sensitive data identification, ransomware deployment, and crucial defense strategies. The video also covers related topics such as programming languages, anti-virus software, virtual machines for labs, zip bombs, hacker ethics, and malware honeypots, providing a comprehensive overview of cybersecurity concepts and practices.

Hackers Demonstrate a Ransomware Attack

SecurityFWD
Add to list
0:00 / 0:00