The FTP bounce attack is an example of how a legitimate application can be used for other purposes. In this video, you’ll learn how this legacy attack type works and how it was used to manipulate systems.
CompTIA Network+ N10-005
If you can see the packets, then you see everything. In this video, you’ll learn about packet analysis and how packet-based attacks can provide the hacker with extensive information about your traffic patterns and application data.
A buffer overflow is a common application weakness, and exploiting a buffer overflow can provide the hacker with extensive control over your computer system. In this video, you’ll learn the basics of buffer overflows and how they are used to take over your PC.
One of the most common attacks come from viruses and malware, and some worms have caused extensive damage in a very short period of time. In this video, you’ll learn about virus and worm attacks and some of the techniques for preventing damage from these attacks.
A social engineering attack is one of the most targeted attacks you’ll find, and it’s also the least technical. In this video, you’ll learn about social engineering and some of the techniques that the bad guys use to infiltrate our ranks using social engineering.
A man in the middle attack can be used to invisibly watch all of the communication between two devices, including encrypted data. In this video, you’ll learn the techniques that hackers use to use these MitM attacks.
A denial of service attack can cause a network resource to be unavailable, and it can be difficult to protect against such attacks. In this video, you’ll learn about DoS and DDoS, and how the bad guys can use specific attacks to bring down our network resources.
How easy would it be for a bad guy to pose as a legitimate wireless network? In this video, you’ll learn how rogue access points and evil twins can be used to infiltrate legitimate wireless networks.
One of the concerns of any wireless network is the security of the encrypted wireless traffic. In this video, you’ll learn techniques that the bad guys use to crack both WEP and WPA protected wireless networks.
Wireless networks are important resources, and we have a number of techniques available to find the wireless networks that might be located around us. In this video, you’ll learn about modern war driving and wireless network identification techniques.