Botnets for Mining Cryptocurrencies - Renita Murimi

Botnets for Mining Cryptocurrencies - Renita Murimi

CAE in Cybersecurity Community via YouTube Direct link

Coinhive - legitimate framework for browser-based mining

13 of 22

13 of 22

Coinhive - legitimate framework for browser-based mining

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Botnets for Mining Cryptocurrencies - Renita Murimi

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Rising popularity
  3. 3 Botnet core
  4. 4 Push and pull frameworks
  5. 5 The appeal of botnets for cryptomining
  6. 6 Types of botnet-based mining activity
  7. 7 Consensus protocol
  8. 8 Mining environment
  9. 9 Browser evolution - HTML, CSS, JavaScript, HTML5
  10. 10 Cross Origin Resource Sharing (CORS)
  11. 11 How does that help cryptomining?
  12. 12 Other factors that aid cryptomining
  13. 13 Coinhive - legitimate framework for browser-based mining
  14. 14 Issues with cryptojacking
  15. 15 Cryptocurrency theft
  16. 16 Clipboard Hijacking
  17. 17 ZeroAccess Botnet
  18. 18 Botnets Targeting Mobile Apps
  19. 19 Botnets Targeting Websites
  20. 20 Secure Web Development Frameworks
  21. 21 Novel approach
  22. 22 Future Directions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.