Completed
Intro
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
How to Detect Business Email Compromise and Email Account Compromise
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Who are we
- 3 What is business email compromise
- 4 You should care about this
- 5 Initial access
- 6 Examples
- 7 MFA bypass methods
- 8 Persistent access without MFA
- 9 Legacy authentication
- 10 Resource owner password credentials
- 11 B2RPC user agent
- 12 Authentication flows
- 13 adversary and middle attacks
- 14 open source tools
- 15 how to prevent email compromise
- 16 when account compromise can happen
- 17 what to look for
- 18 email forwarding rules
- 19 new inbox rule
- 20 Bring it on Rachel
- 21 Email rules
- 22 Poll Results
- 23 Outro