Beyond Takeover - Attacker's In. Now What?

Beyond Takeover - Attacker's In. Now What?

OWASP Foundation via YouTube Direct link

Geo Distribution

21 of 25

21 of 25

Geo Distribution

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Beyond Takeover - Attacker's In. Now What?

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Phish the Phishers
  3. 3 Social Attacks
  4. 4 Account Takeover Objectives
  5. 5 The Phishing Ecosystem
  6. 6 Research Objectives
  7. 7 The Research Process
  8. 8 Our Baits Network
  9. 9 Make Accounts Authentic
  10. 10 Account Monitoring
  11. 11 Trace Login Attempts
  12. 12 Credential Leakage
  13. 13 Account Penetration
  14. 14 Access Time
  15. 15 Password Reuse Practices
  16. 16 Effectiveness of Traps
  17. 17 Account Abuse
  18. 18 Story Time - Full account takeover
  19. 19 Manual or Automated?
  20. 20 Covering the tracks
  21. 21 Geo Distribution
  22. 22 Investigating incident
  23. 23 Conclusions
  24. 24 Human is Human
  25. 25 CISO Takeaways

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.