Two Strategies for Supply Chain Attacks

Two Strategies for Supply Chain Attacks

Hack In The Box Security Conference via YouTube Direct link

Case E : Hijacking account

15 of 22

15 of 22

Case E : Hijacking account

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Two Strategies for Supply Chain Attacks

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 What is Supply Chain Attack?
  3. 3 ASUS Supply Chain Attack : Select Infection PC
  4. 4 ASUS Supply Chain Attack : TYPE - B
  5. 5 Case Study: Supply Chain Attack
  6. 6 Case A : Overview
  7. 7 Case B: Overview
  8. 8 Case B: Plug X malware
  9. 9 Case B : Select Infection PC
  10. 10 Case C: Overview
  11. 11 Case C: Hiding Attacker IP
  12. 12 Case C: Distribution Additional Malware
  13. 13 Case D: Overview Update server of
  14. 14 Case E : Overview
  15. 15 Case E : Hijacking account
  16. 16 Association Analysis: Select Infection PC
  17. 17 Association Analysis: Code Tampering
  18. 18 Association Analysis: ShadowPad
  19. 19 Association Analysis : Plugx Module
  20. 20 Association Analysis : Attacker IP
  21. 21 Attack Features and Strategies : ATT&CK Matrix
  22. 22 Defensive Strategy

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.