Behind Enemy Lines - Inside the Operations of a Nation State's Cyber Program

Behind Enemy Lines - Inside the Operations of a Nation State's Cyber Program

0xdade via YouTube Direct link

Vendors Are Reading Our Research

14 of 21

14 of 21

Vendors Are Reading Our Research

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Behind Enemy Lines - Inside the Operations of a Nation State's Cyber Program

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 New phone, who dis?
  3. 3 The Quest for a Cyber Surveillance Program
  4. 4 What goes through the mind of a nation state?
  5. 5 Building Your Cyber Surveillance Program
  6. 6 SELLERS OF SURVEILLANCEWARE...
  7. 7 The Vendors
  8. 8 Zero Click iOS Compromise
  9. 9 Mobile 0-days Compromise
  10. 10 Edge 0-Day Demo Video
  11. 11 Flash 0-Day Demo Video
  12. 12 Desktop 0-days Compromise
  13. 13 Network Traffic Interception
  14. 14 Vendors Are Reading Our Research
  15. 15 Why inhouse development?
  16. 16 StoneFish and Barracuda
  17. 17 iOS Tooling and Capabilities
  18. 18 iOS Infection Vector
  19. 19 Android Infection Vectors
  20. 20 Data Analysis
  21. 21 Attribution Disclaimer

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.