Active Defense - Helping Threat Actors Hack Themselves

Active Defense - Helping Threat Actors Hack Themselves

via YouTube Direct link

Protecting Legitimate Users

6 of 24

6 of 24

Protecting Legitimate Users

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Active Defense - Helping Threat Actors Hack Themselves

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Active Defense Helping Threat Actors Hack Themselves!
  2. 2 Why Active Defense?
  3. 3 Presentation Focus
  4. 4 Inspirations
  5. 5 Conventions Used
  6. 6 Protecting Legitimate Users
  7. 7 "robots.txt" files
  8. 8 Sitemap XML files
  9. 9 Directory Indexes
  10. 10 Authorized Users Only
  11. 11 The Roundtrip Roundkick
  12. 12 Subdomain Examples
  13. 13 Stomachvivor / Gross Out
  14. 14 Reflector Madness
  15. 15 Inside the source code
  16. 16 Going Nowhere Fast!
  17. 17 Pi to the Face
  18. 18 The Setup...
  19. 19 Inside "bookmarks.html"
  20. 20 CPU Impacts to Attackers
  21. 21 The Wrong Answer
  22. 22 Bobby Dropkick
  23. 23 Alternative Active Defense Options
  24. 24 Questions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.