How Does Ransomware Work? - A Step-by-Step Breakdown
NOTE: This video is made for educational purposes only. I do not promote the use of or proliferation of any illegal or illicit activity.
👉 Check out Kemp Flowmon Here: https://www.flowmon.com/en?utm_source=grant-collins&utm_medium=youtube
🔗 Links Mentioned:
theZoo - A Live Malware Repository GitHub: https://github.com/ytisf/theZoo
Phishing Email Statistic: https://www.safeguardcyber.com/blog/phishing-attacks-are-what-percentage-of-cyber-attacks
⭐ Video Credits:
How To Create Encoded Payload for PDF -- Embedding EXE Payload in PDF Using Autoit Script.mp4 by George Ferreira Costa : https://www.youtube.com/watch?v=-yGnXiVg-d4
DLL Hijacking Tutorial by nbq : https://www.youtube.com/watch?v=XvxeUxOvKb0&t=6s
Web Shells: A brief Tour: Hurricane Labs : https://www.youtube.com/watch?v=F4iGHbY17as
Credentials Dumping - RDP by Pentest Laboratories : https://www.youtube.com/watch?v=KzP-yx6Dq_U
Offensive Security: C2 - Intro to C2 by Injection : https://www.youtube.com/watch?v=Wk6xobVsZf4
🐕 Follow Me:
Twitter: https://twitter.com/collinsinfosec
Instagram: https://www.instagram.com/collinsinfosec
Cybercademy Discord Server: https://discord.gg/bWymWhCv9p
🤔 Have questions, concerns, comments?:
Email me: grant@cybercademy.org
🎧 Gear:
Laptop (Lenovo X1 Carbon Ultrabook 6th Gen): https://amzn.to/2O0UfAM
Monitors (Dell D Series 31.5” D3218HN): https://amzn.to/2EXlgRF
Keyboard (Velocifire VM01): https://amzn.to/2TEswfd
Headphones (Audio Technica ATH-M40x): https://amzn.to/2F4Tvq6
Standing Desk (FlexiSpot Height Adjustable 47 inch): https://amzn.to/3p3uSAa
Видео How Does Ransomware Work? - A Step-by-Step Breakdown канала Grant Collins
👉 Check out Kemp Flowmon Here: https://www.flowmon.com/en?utm_source=grant-collins&utm_medium=youtube
🔗 Links Mentioned:
theZoo - A Live Malware Repository GitHub: https://github.com/ytisf/theZoo
Phishing Email Statistic: https://www.safeguardcyber.com/blog/phishing-attacks-are-what-percentage-of-cyber-attacks
⭐ Video Credits:
How To Create Encoded Payload for PDF -- Embedding EXE Payload in PDF Using Autoit Script.mp4 by George Ferreira Costa : https://www.youtube.com/watch?v=-yGnXiVg-d4
DLL Hijacking Tutorial by nbq : https://www.youtube.com/watch?v=XvxeUxOvKb0&t=6s
Web Shells: A brief Tour: Hurricane Labs : https://www.youtube.com/watch?v=F4iGHbY17as
Credentials Dumping - RDP by Pentest Laboratories : https://www.youtube.com/watch?v=KzP-yx6Dq_U
Offensive Security: C2 - Intro to C2 by Injection : https://www.youtube.com/watch?v=Wk6xobVsZf4
🐕 Follow Me:
Twitter: https://twitter.com/collinsinfosec
Instagram: https://www.instagram.com/collinsinfosec
Cybercademy Discord Server: https://discord.gg/bWymWhCv9p
🤔 Have questions, concerns, comments?:
Email me: grant@cybercademy.org
🎧 Gear:
Laptop (Lenovo X1 Carbon Ultrabook 6th Gen): https://amzn.to/2O0UfAM
Monitors (Dell D Series 31.5” D3218HN): https://amzn.to/2EXlgRF
Keyboard (Velocifire VM01): https://amzn.to/2TEswfd
Headphones (Audio Technica ATH-M40x): https://amzn.to/2F4Tvq6
Standing Desk (FlexiSpot Height Adjustable 47 inch): https://amzn.to/3p3uSAa
Видео How Does Ransomware Work? - A Step-by-Step Breakdown канала Grant Collins
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Security Specialist | Complete Career Series for Cybersecurity10 Ways if You are Wired for a Cybersecurity CareerSign Up For This in Cybersecurity! | Ft. I.T. NerdWhere You Should Compete for Capture the Flag Event in Cybersecurity | Capture the Flag SeriesCybersecurity Career Quiz [Free Download]Official Launch of Community Discord Channelimposter syndrome in cybersecurity - it never goes away.Exposing the "hacking service" scamBuild a Malware Analysis Lab (Self-Hosted & Cloud) - The Malware Analysis Project 101Build a Cloud Red Team / Blue Team Cybersecurity Homelab - Crash CourseI Co-Founded a Cybersecurity Conference BSides Chapter - Here's What I Learnedfeeling behind in cybersecurity... - it never goes away.5 Resources for the I.T. FundamentalsCybersecurity University Education - One Significant ProblemMy Summer PlansBridging the I.T. Security Experience Gap (as a cybersecurity student)3 Practical Application Strategies in CybersecurityCybersecurity - It's About the Learning JourneyThe Cybersecurity Industry Is Broader Than You Think...Start a Cybersecurity Career in 2023 - A Complete GuideGC2 - Hack with Google Sheets & Drive. (C2 Infrastructure)