Completed
Takeaways 1: Just Like defenders, cybercriminals have blind spots in coding, configuration, and deployment of their exploit toolkits.
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Adventures with Cybercrime Toolkits - Insights for Pragmatic Defense
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Adventures with Cybercrime Toolkits: Insights for Pragmatic Defense
- 3 Probing exploit kits to milk behavioral fingerprints
- 4 Controlled probing of exploit kits to milk behavioral fingerprint
- 5 Leveraging blind spots in exploit kits to turn the table on cybercriminals
- 6 Take advantage of flaws in exploit kit code to fight back
- 7 Who will be using such a strategy and and for what?
- 8 Defense capability gained
- 9 How complex is a concrete exploit?
- 10 Lesson for pragmatic defense
- 11 In the cybercrime arms race, how do we improve the state of defense?
- 12 Takeaways 1: Just Like defenders, cybercriminals have blind spots in coding, configuration, and deployment of their exploit toolkits.