Aaron Jones: Introduction to cyber reconnaissance

แชร์
ฝัง
  • เผยแพร่เมื่อ 12 พ.ย. 2024

ความคิดเห็น • 8

  • @3dprintinglady
    @3dprintinglady 2 ปีที่แล้ว +1

    Very helpful! Thanks for uploading these talks - I wish there were more!

  • @domaincontroller
    @domaincontroller 4 ปีที่แล้ว +1

    10:32 hacking timeline 12:07 the next part is going to be scanning and probing 13:18 infiltration 15:15 exfiltration 15:58 red teams 18:04 blue teams 18:51 white team 19:51 nmap

  • @jonnysokkoatduckdotcom
    @jonnysokkoatduckdotcom 11 หลายเดือนก่อน

    "You're going to get popped, its just a matter of time!" its true PREPARE NOW!!!!

  • @crazymonkeyVII
    @crazymonkeyVII 4 ปีที่แล้ว +1

    Regarding Astra, in (Western) Europe, it is common for caught criminals to not be identified. The idea is that after someone fulfilled their punishment, or if someone was wrongfully convicted, this won't haunt them the rest of their lives, and doesn't force them back into criminality (if people cannot find a job after their punishment, they'll be forced back into criminality). However, when applying to an important/responsible job, there is a background check that will fail if the prospect has a (recent) criminal record in a relevant category.

    • @TheSecurityAgency
      @TheSecurityAgency 4 ปีที่แล้ว

      As an employer in Europe, I can assure you that you need for almost every imaginable position a criminal record certificate. Therefore you are screwed.
      The law in some very "advanced" EU countries is trash, not as barbaric as in the US, but nevertheless.

  • @nojabformeeducateyourself3393
    @nojabformeeducateyourself3393 6 ปีที่แล้ว

    Good information. Thanks!!

  • @jonnysokkoatduckdotcom
    @jonnysokkoatduckdotcom 11 หลายเดือนก่อน

    of course the company is going to say $360M, if they went before the judge and said "nothing was really stolen but..." the judge would say, ":well then, i guess we dont have a case then do we?"

  • @εύς
    @εύς 3 ปีที่แล้ว

    24:24 masscan