Professor Messer

Client Hijacking Attacks – CompTIA Security+ SY0-501 – 1.2

Instead of breaking into the server, why not just take over the client? In this video, you’ll learn a number of techniques that attackers can use to hijack your computer or mobile device. << Previous Video: Replay Attacks Next: Driver Manipulation >> There are a number of malicious reasons why a bad guy would want […]

Client Hijacking Attacks – CompTIA Security+ SY0-501 – 1.2 Read More »

Zero-Day Attacks – CompTIA Security+ SY0-501 – 1.2

There are unknown vulnerabilities in our operating systems and applications, and it’s a race to see who can exploit them first. In this video, you’ll learn about zero-day attacks and what you can do to prevent an unforeseen attack. << Previous Video: DNS Poisoning and Domain Hijacking Next: Replay Attacks >> The operating systems and

Zero-Day Attacks – CompTIA Security+ SY0-501 – 1.2 Read More »

DNS Poisoning and Domain Hijacking – CompTIA Security+ SY0-501 – 1.2

If you can’t hack the user, maybe you can hack the DNS server. In this video, you’ll learn how a DNS poisoning attack or domain hijacking can allow an attacker to seamlessly impersonate an entire company. << Previous Video: Privilege Escalation Next: Zero-Day Attacks >> The domain name services are a critical part of our

DNS Poisoning and Domain Hijacking – CompTIA Security+ SY0-501 – 1.2 Read More »

Privilege Escalation – CompTIA Security+ SY0-501 – 1.2

The fastest way to become the system administrator is to steal it. In this video, you’ll learn how privilege escalation can instantly take you from zero to user 0. << Previous Video: Cross-site Request Forgery Next: DNS Poisoning and Domain Hijacking >> Privilege escalation is the type of vulnerability you really don’t want to have

Privilege Escalation – CompTIA Security+ SY0-501 – 1.2 Read More »

Cross-site Request Forgery – CompTIA Security+ SY0-501 – 1.2

Session riding can be one of the more challenging attack types to guard against. In this video, you’ll learn how XSRF works and how the bad guys can manipulate a vulnerable application for their own gain. << Previous Video: Cross-site Scripting Next: Privilege Escalation >> The cross-site request forgery attack is sometimes called a one-click

Cross-site Request Forgery – CompTIA Security+ SY0-501 – 1.2 Read More »

Cross-site Scripting – XSS – CompTIA Security+ SY0-501 – 1.2

If you can convince a browser to run a script, then you can control a significant amount of a user’s working environment. In this video, you’ll learn about cross-site scripting and how XSS attacks can be used to steal right from under our noses. << Previous Video: Data Injection Next: Cross-site Request Forgery >> Cross-site

Cross-site Scripting – XSS – CompTIA Security+ SY0-501 – 1.2 Read More »

Buffer Overflows – CompTIA Security+ SY0-501 – 1.2

A badly written application can open the door to mischief. In this video, you’ll learn how a single buffer overflow can disrupt the security of an operating system. << Previous Video: Man-in-the-Middle Next: Data Injection >> As you’re probably aware, the applications that we’re using store everything that they need in the memory of your

Buffer Overflows – CompTIA Security+ SY0-501 – 1.2 Read More »

Man-in-the-Middle – CompTIA Security+ SY0-501 – 1.2

If an attacker can sit between you and your data, they’ll have access to a wealth of information. In this video, you’ll learn about man-in-the-middle attacks and what you can do to prevent them. << Previous Video: Denial of Service Next: Buffer Overflows >> We usually consider our network communication to be private. We’re communicating

Man-in-the-Middle – CompTIA Security+ SY0-501 – 1.2 Read More »