Exploitation Techniques and Attacks on Hosting Assets and Access for Resale

Exploitation Techniques and Attacks on Hosting Assets and Access for Resale

Hack In The Box Security Conference via YouTube Direct link

Intro

1 of 25

1 of 25

Intro

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Exploitation Techniques and Attacks on Hosting Assets and Access for Resale

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Players, services, prices and means of delivery
  3. 3 Here is an example of a seller
  4. 4 Telegram channels have bots to buy hosts
  5. 5 Types of "hosting" machines at a glance
  6. 6 Dedicated shops
  7. 7 Proxies on victimized hosts
  8. 8 Clouds
  9. 9 We can come back to the same threat actor we have seen before
  10. 10 Credentials parsing
  11. 11 Credentials validation
  12. 12 Automation of RDP probing
  13. 13 Sources of credentials
  14. 14 Another example: Electronic maker
  15. 15 Level of access
  16. 16 Primary targets in Organizatons
  17. 17 Example: Ryuk - use of old vulns
  18. 18 Access and lateral movements sales
  19. 19 The same seller
  20. 20 How access to acquired resources is sold
  21. 21 Empower of cloud technologies
  22. 22 Dedicated server with PP balance 21k USD
  23. 23 Lifecycle of compromised asset
  24. 24 Two more weeks, $500 000 ransom
  25. 25 1 more week, Not Paid, password published

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.