Completed
User Agent Strings
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Honeypots for Active Defense
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Traditional Defensive Concepts
- 3 Theres Always a Way
- 4 Its Not Just APTs
- 5 What is Active Defense
- 6 Security Engineering
- 7 Use Cases
- 8 Honey Dr3
- 9 ADHD
- 10 Warning banners
- 11 Honeypot types
- 12 Linux example
- 13 PowerShell example
- 14 Artillery Supply
- 15 Artillery Logs
- 16 File Integrity Monitoring
- 17 Publicfacing Honeypots
- 18 Wordpot
- 19 PHPMyAdmin
- 20 Fake Application
- 21 Honey Badger
- 22 Example
- 23 Medium Interaction
- 24 Capo
- 25 Kippo
- 26 Github
- 27 Tools
- 28 Router Manhunter
- 29 Warnings
- 30 Audio Issues
- 31 Windows Box
- 32 Wire Transfer
- 33 Zip Bombs
- 34 NetCat
- 35 Monitoring
- 36 Security Tools
- 37 Thread Intelligence
- 38 Event Correlation
- 39 Dynamic Honeypots
- 40 Rapid Response Tools
- 41 PowerShell Recon
- 42 ippograph
- 43 Modern Honey Network
- 44 Data Collection
- 45 Top User Names
- 46 File Access
- 47 User Agent Strings
- 48 payloads
- 49 directionality
- 50 dashboard
- 51 recommended reading
- 52 questions