Тёмный
No video :(

Attack Tactics: Part 1 

Black Hills Information Security
Подписаться 60 тыс.
Просмотров 17 тыс.
50% 1

Опубликовано:

 

28 авг 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 18   
@marklewis1979
@marklewis1979 6 лет назад
Once again, BHIS leading the way with actual, helpful, real-world industry knowledge, as opposed to the countless hours of Web and podcasts that talk a lot but say nothing. Looking forward to the next one.
@BlackHillsInformationSecurity
@BlackHillsInformationSecurity 6 лет назад
We're so glad to hear that you find these so useful!
@luketanner6987
@luketanner6987 4 года назад
Admittedly, I'm new to the world of Security training and webcasts, but John Strand is my favorite. Love his style and humor and deep knowledge.
@rusirumunasingha2234
@rusirumunasingha2234 3 года назад
I’m commenting here so more of this will get recommended to me! This was very informative!
@user-eu2yf6ij2t
@user-eu2yf6ij2t 2 года назад
That logo is much better than the old one ;) whoever came up with that, props to you.
@IteLuis
@IteLuis 5 лет назад
This webcast was awesome!!!
@cscokid75
@cscokid75 6 лет назад
This is an awesome series. Love it guys. Looking forward to part 2. Keep up the great work!!
@bobbyrenaud559
@bobbyrenaud559 6 лет назад
You guys are awesome! Looking forward to this series!
@ericmoore4515
@ericmoore4515 6 лет назад
This is nice topic and skill
@disclosure.group.6582
@disclosure.group.6582 4 года назад
Very good best vids I've come across yet and I've watched afew👍
@SecureTheWorld
@SecureTheWorld 6 лет назад
Thanks a lot for this knowledge sharing. Could you please post the tools mentioned in the video!
@namishc
@namishc 6 лет назад
A new one for me was harvesting credentials for user and using this in every other server that may not have 2FA enabled
@DavidThomsenPhD
@DavidThomsenPhD 6 лет назад
Does anyone know which tool they were talking about in regards to changing your IP. Not proxy cannon but the one John talks about using the Amazon AWS lamda something.
@flawlessfinn689
@flawlessfinn689 6 лет назад
Hey I want to be a programmer when I grow up and I’m learning c# and I’m only 16 years old, I’m hoping that if my c# coding will help me to be a programmer but recent studies show cyber security officers make more money, if I finish my c# will it help my dry erase security so I can be a programmer and a cyber security officer when I grow up
@BlackHillsInformationSecurity
@BlackHillsInformationSecurity 6 лет назад
programming always is great. have you seen John's 5 year plan webcast?
@flawlessfinn689
@flawlessfinn689 6 лет назад
Black Hills Information Security no sadly, may I hav a link
@BlackHillsInformationSecurity
@BlackHillsInformationSecurity 6 лет назад
ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-Uv-AfK7PkxU.html
@immortalwarbird861
@immortalwarbird861 2 года назад
This may be used with nefarious intent.
Далее
Attack Tactics: Part 2
1:03:38
Просмотров 5 тыс.
Attack Tactics 7: The logs you are looking for
54:55
Кого из блогеров узнали?
00:10
Просмотров 567 тыс.
Attack Tactics 5: Zero to Hero Attack
1:02:28
Просмотров 14 тыс.
How Hackers Move Through Networks (with Ligolo)
20:01
Просмотров 267 тыс.
Think You're Compromised?  What Do We Do Next?
1:02:27
Просмотров 7 тыс.