Completed
Finding the most Sensitive Data
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Hackers Demonstrate a Ransomware Attack
Automatically move to the next video in the Classroom when playback concludes
- 1 Countdown
- 2 Intro
- 3 Null Byte Cat Cameo
- 4 What We're Doing Today
- 5 Metasploit and Attack Setup
- 6 Phishing E-mail
- 7 Command and Control
- 8 Exploiting the Target Machine
- 9 Reverse DNS Look-ups
- 10 Password Spray
- 11 Ticket Harvesting Attack
- 12 Hash Cracking
- 13 We Have the Password, Now What?
- 14 Finding the most Sensitive Data
- 15 Launching the Ransomeware
- 16 Defending Against this Attack
- 17 What did Kilian Study
- 18 Kody uses a Macbook
- 19 Best Programming Languages
- 20 Anti-virus
- 21 What VM do we use for the Labs
- 22 Zip Bomb
- 23 Hacker Ethics
- 24 Malware Honeypots
- 25 Closing Thoughts