Learn about cyber security from a red-team perspective
Training material that covers the basics of cyber security
Learn about cyber security from a red-team perspective
These videos examine the mentality of hackers.
These videos examine the mentality of hackers.
These videos discuss some of the methodologies of hackers.
These videos discuss some of the methodologies of hackers.
These videos overview social engineering, provide examples of social engineering attacks, and give techniques for prevention.
These videos overview social engineering, provide examples of social engineering attacks, and give techniques for prevention.
These videos explore the basic concepts involved in a DoS attack, the types of DoS attacks, and how to cover DoS tracks.
These videos explore the basic concepts involved in a DoS attack, the types of DoS attacks, and how to cover DoS tracks.
These videos explore the basic concepts involved in a DoS attack, the types of DoS attacks, and how to cover DoS tracks.
A rootkit is hard-to-detect software that is put onto a machine in order to gain administrative (root) privileges that are used to prevent the detection of other malicious software and processes.
A rootkit is hard-to-detect software that is put onto a machine in order to gain administrative (root) privileges that are used to prevent the detection of other malicious software and processes.
Static code analysis tools help developers to find bugs in their code. FindBugs is an open source static code analysis for Java.
These videos discuss how to exploit binary files in depth.
These videos discuss how to exploit binary files in depth.
These videos discuss how to exploit binary files in depth.
These videos discuss how to exploit binary files in depth.
These videos discuss how to exploit binary files in depth.
This video explains how to setup your computer to do the various types of web exploitation explained in the follow-on videos. They allow you to practice on your local machine, not on a public website, which would probably be illegal.
This video looks as the basics of cross site scripting (XSS), a couple types of XSS attacks, and how to defend against it.
This video demoes how to conduct a cross site scripting (XSS) attack.
This talks about the basic of Structured Query Language (SQL) and three types of SQL injection.
This video gives an example of a Structured Query Language (SQL) injection attack.
Cross Site Request Forgery (CSRF) is a web-based attack that forces a user to unintentionally send an HTTP request to a URL in order to perform some action. The user typically executes undesirable actions in a web application in which they are already authenticated.
Cross Site Request Forgery (CSRF) is a web-based attack that forces a user to unintentionally send an HTTP request to a URL in order to perform some action. The user typically executes undesirable actions in a web application in which they are already authenticated.
Any exploit that maliciously uses cookies is a cookie exploit. One type of cookie exploit is cookie stealing, where a malicious user steals someone else’s cookie.
Any exploit that maliciously uses cookies is a cookie exploit. One type of session exploit is cookie poisoning, where a malicious user alters the value of variables in his own cookies.
Any exploit that maliciously modifies how domain name servers (DNS) work is a DNS exploit. One common type of exploit is DNS spoofing (aka DNS cache poisoning). Read More.
Any exploit that maliciously modifies how domain name servers (DNS) work is a DNS exploit. One common type of exploit is DNS spoofing (aka DNS cache poisoning). Read More.
Cross Site Request Forgery (CSRF) is a web-based attack that forces a user to unintentionally send an HTTP request to a URL in order to perform some action. The user typically executes undesirable actions in a web application in which they are already authenticated. Read More.