Hacking Heuristics

Hacking Heuristics

NorthSec via YouTube Direct link

Brief overview of Command and Control (C2)

18 of 28

18 of 28

Brief overview of Command and Control (C2)

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Hacking Heuristics

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Red team analytics
  3. 3 What is a heuristic?
  4. 4 Automatic vs calculated
  5. 5 Case study: Making Xerox Copies
  6. 6 Common behavioral heuristics
  7. 7 The Linda Problem
  8. 8 Your morning decisions
  9. 9 Experience and context
  10. 10 Active Directory Concepts
  11. 11 Fast lane to DA
  12. 12 Appearance
  13. 13 Physical assessments
  14. 14 Adobe
  15. 15 Browser extensions
  16. 16 Microsoft Office
  17. 17 MacOS App Store
  18. 18 Brief overview of Command and Control (C2)
  19. 19 (A few) cloud providers
  20. 20 Reproducing Google and Microsoft network traffic
  21. 21 Unique parameters
  22. 22 Potential infrastructure setup
  23. 23 Domain fronting
  24. 24 Telling a story with Microsoft
  25. 25 Blending in with real Google products
  26. 26 Domain categorization vendors
  27. 27 Being real
  28. 28 Phishing yourself

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.