Wolf in Shell's Clothing - Why You Should Be Skeptical of Your Trusted Tools

Wolf in Shell's Clothing - Why You Should Be Skeptical of Your Trusted Tools

via YouTube Direct link

Intro

1 of 35

1 of 35

Intro

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Wolf in Shell's Clothing - Why You Should Be Skeptical of Your Trusted Tools

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Who am I
  3. 3 Cost of data breach
  4. 4 Data Breaches
  5. 5 Windows XP
  6. 6 How do companies know theyve been hacked
  7. 7 Zeroday vulnerabilities
  8. 8 Manual hijacking
  9. 9 Driveby downloads
  10. 10 Ad networks
  11. 11 We are not invincible
  12. 12 Stop shaming companies
  13. 13 Assumptions
  14. 14 caveats
  15. 15 user IDs
  16. 16 substitution dash
  17. 17 why bother
  18. 18 Set User ID
  19. 19 Sticky
  20. 20 Setuid
  21. 21 Run as root
  22. 22 Run as system admin
  23. 23 TCP dump
  24. 24 EchoDe
  25. 25 Password
  26. 26 Shell Swap
  27. 27 Red Team Field Manual
  28. 28 PFsense
  29. 29 Fixing
  30. 30 File Integrity
  31. 31 OpenScab
  32. 32 Stateless machines
  33. 33 Security is the enemy
  34. 34 Do they believe their network has been penetrated
  35. 35 Heartbleed

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.