Completed
Lifecycle of compromised asset
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Exploitation Techniques and Attacks on Hosting Assets and Access for Resale
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Players, services, prices and means of delivery
- 3 Here is an example of a seller
- 4 Telegram channels have bots to buy hosts
- 5 Types of "hosting" machines at a glance
- 6 Dedicated shops
- 7 Proxies on victimized hosts
- 8 Clouds
- 9 We can come back to the same threat actor we have seen before
- 10 Credentials parsing
- 11 Credentials validation
- 12 Automation of RDP probing
- 13 Sources of credentials
- 14 Another example: Electronic maker
- 15 Level of access
- 16 Primary targets in Organizatons
- 17 Example: Ryuk - use of old vulns
- 18 Access and lateral movements sales
- 19 The same seller
- 20 How access to acquired resources is sold
- 21 Empower of cloud technologies
- 22 Dedicated server with PP balance 21k USD
- 23 Lifecycle of compromised asset
- 24 Two more weeks, $500 000 ransom
- 25 1 more week, Not Paid, password published