Scanning IPv4 for Exposed Data and Vulnerable Databases

Scanning IPv4 for Exposed Data and Vulnerable Databases

LASCON via YouTube Direct link

Exposed Data

12 of 31

12 of 31

Exposed Data

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Scanning IPv4 for Exposed Data and Vulnerable Databases

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 About me
  3. 3 Projects
  4. 4 Agenda
  5. 5 How many people have ever made a web app
  6. 6 Two ways to store data
  7. 7 What should you use
  8. 8 The problem
  9. 9 Sensitive data is exposed
  10. 10 What kind of data is exposed
  11. 11 Shoten and Binary Edge
  12. 12 Exposed Data
  13. 13 Memcache
  14. 14 Redis
  15. 15 Demo
  16. 16 Sensitive Information
  17. 17 SemiSensitive Information
  18. 18 Free Space
  19. 19 Cloud Storage
  20. 20 Systems
  21. 21 Systems Available
  22. 22 Elastic Search Vulnerability
  23. 23 Elastic Honey
  24. 24 Fake Ransomware
  25. 25 Memcached Vulnerability
  26. 26 The Landscape
  27. 27 Default Configurations
  28. 28 Things are getting better
  29. 29 Protected mode
  30. 30 Security hygiene
  31. 31 Resources

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.