Cyber Attack

Training material that covers the basics of cyber security

Learn about cyber security from a red-team perspective

Hackers

Hacker Mindset

These videos examines how hackers think and break boundaries.
Source: Tim Summers PhD via TEDx Talks

Hacker Culture - History and Influences

This video takes a look at hacker culture and its history
Source: Nelson Zhang via TEDx Talks

Hacker Culture

These videos discusses the different types of hackers and how they impact society.
Source: Boston 25 News

Hacker Culture

This video discusses the different types of hackers (hats) and what they do.
Source: Techquickie

Social Engineering

Social Engineering

These videos overview social engineering, provide examples of social engineering attacks, and give techniques for prevention.
Source: MalwareFox

Social Engineering

This video takes a look at how social engineering is used to acess personal information and methods of prevention
Source: CBC News

Denial of Service

Denial of Service (DoS) Attack

These videos explore the basic concepts involved in a DoS attack, the types of DoS attacks, and how to cover DoS tracks.
Source: PowerCert Animated Videos

Denial of Service (DoS) Attack

These videos explore the basic concepts involved in a DoS attack, the types of DoS attacks, and how to cover DoS tracks.
Source: Tom Scott via Computerphile

Denial of Service (DoS) Attack

These videos explore the basic concepts involved in a DoS attack, the types of DoS attacks, and how to cover DoS tracks.
Source: IBM Technology

Operating System Exploitation

Rootkits

A rootkit is hard-to-detect software that is put onto a machine in order to gain administrative (root) privileges that are used to prevent the detection of other malicious software and processes.
Source: WatchGuard Technologies

Rootkits

A rootkit is hard-to-detect software that is put onto a machine in order to gain administrative (root) privileges that are used to prevent the detection of other malicious software and processes.
Source: WatchGuard Technologies

Source Code Exploitation

Static Code Analysis

Static code analysis tools help developers to find bugs in their code. FindBugs is an open source static code analysis for Java.
Source: NetBeansVideos

X86 Binary Exploitation

X86 Binary Exploitation

These videos discuss how to exploit binary files in depth.
Source: LiveOverflow

X86 Binary Exploitation Setup and Tools

These videos discuss how to exploit binary files in depth along with the tools used.
Source: CryptoCat

X86 Binary Exploitation Lab

This video discusses binary exploitation in a walkthough to learn the basics and how it is performed.
Source: PinkDraconian

X86 Binary Exploitation Lab

This video shows looks at a binary overflow and how to perform it with pwn.
Source: John Hammond

Web Exploitation

Web Exploitation Enviornment Setup

This video explains how to setup your computer to do the various types of web exploitation explained in the follow-on videos. They allow you to practice on your local machine, not on a public website, which would probably be illegal.
Source: NetworkChuck

XSS

This video looks as the basics of cross site scripting (XSS), a couple types of XSS attacks, and how to defend against it.
Source: PwnFunction

XSS Lab

This video demoes how to conduct a cross site scripting (XSS) attack.
Source: Academind

SQL Injection

This talks about the basic of Structured Query Language (SQL) and three types of SQL injection.
Source: Tom Scott via Computerphile

SQL Injection Lab

This video gives an example of a Structured Query Language (SQL) injection attack.
Source: Computerphile

CSRF

Cross Site Request Forgery (CSRF) is a web-based attack that forces a user to unintentionally send an HTTP request to a URL in order to perform some action. The user typically executes undesirable actions in a web application in which they are already authenticated.
Source: Tom Scott via Computerphile

CSRF

Cross Site Request Forgery (CSRF) is a web-based attack that forces a user to unintentionally send an HTTP request to a URL in order to perform some action. The user typically executes undesirable actions in a web application in which they are already authenticated.
Source: Sam Bowne

Cookie Exploit

Any exploit that maliciously uses cookies is a cookie exploit. One type of cookie exploit is cookie stealing, where a malicious user steals someone else’s cookie.
Source: Computerphile

Cookie Exploit

This video takes a look at an example of cookie stealing and how it can be combated and used.
Source: HackerSploit

DNS Exploit

Any exploit that maliciously modifies how domain name servers (DNS) work is a DNS exploit. One common type of exploit is DNS spoofing (aka DNS cache poisoning). Read More.
Source: Udacity

DNS Exploit

Any exploit that maliciously modifies how domain name servers (DNS) work is a DNS exploit. One common type of exploit is DNS spoofing (aka DNS cache poisoning). Read More.
Source: Hak5

CSRF

Cross Site Request Forgery (CSRF) is a web-based attack that forces a user to unintentionally send an HTTP request to a URL in order to perform some action. The user typically executes undesirable actions in a web application in which they are already authenticated. Read More.