Completed
Exploitation Methods
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Abnormal Behavior Detection in Large Environments
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Abnormal Behavior Detection
- 3 Defense
- 4 Understanding Attack Patterns
- 5 Initial Intrusion
- 6 Exploitation Methods
- 7 HTML Attack
- 8 PowerShell Injection
- 9 Invoke obfuscation
- 10 Honey tokens
- 11 Responder
- 12 SCT Files
- 13 Persistence hooks
- 14 Service creations
- 15 Application whitelisting
- 16 Mitigations
- 17 Purple Time