Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Empirical Exploitation

BSidesLV via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore empirical exploitation techniques in this 45-minute conference talk by H.D. Moore at BSidesLV 2012. Delve into quantifying security research, examining the society of walled gardens, and analyzing various cyber threats including DDoS attacks, BOTS Trojans, and spam. Learn about blacklists, whitelists, and measuring techniques. Discover insights on Internet mass TCP scanning, URL analysis, and UDP ISP email practices. Investigate top 100 ports, service data, and basic statistics. Examine specific technologies and protocols such as VxWorks, MDNS, VNC, NetBIOS, and Cisco IOS. Gain knowledge on unique MAC addresses, STP, and portable security tools in this comprehensive exploration of empirical exploitation methodologies.

Syllabus

Intro
Quantifying Security Research
Society of walled gardens
DDoS attack
BOTS Trojans
Spam
Blacklists
Whitelists
Measuring
Showing Ins
Scanning
Internet Mass
TCP Scanning
URLs
UDP
ISP
Email
Top 100
Shiny Clock
Fancy Clock
Storage
IO
Fun Ports
Service Data
Basic Stats
VXWorks
MDNS
MDNS Devices
Cell Bioinstrument
VNC
My Sequel
NetBIOS
Unique MAC Addresses
STP
Cisco routers
Cisco IOS
Portable Mia

Taught by

BSidesLV

Reviews

Start your review of Empirical Exploitation

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.