Today’s SY0-601 CompTIA Security+ Pop Quiz: I do better with binary
Today’s SY0-601 CompTIA Security+ Pop Quiz: I do better with binary Read More »
Attackers can often use our browsers against us. In this video, you’ll learn how a browser vulnerability can provide an attacker with access to a third-party website. << Previous Video: SQL Injection Next Video: Hardware Vulnerabilities >> In this video, we’ll talk about cross-site scripting. And you may see this also abbreviated as XSS. It
Cross-site Scripting – CompTIA Security+ SY0-701 – 2.3 Read More »
Code injection is a relatively easy attack vector to exploit. In this video, you’ll learn about SQL injections and how they are used by attackers to gain access to our data. << Previous Video: Operating System Vulnerabilities Next Video: Cross-site Scripting >> A code injection attack is a very common application attack where the attacker
Our operating systems can contain numerous vulnerabilities. In this video, you’ll learn how attackers use these vulnerabilities and how to protect your systems from unwanted intrusion. << Previous Video: Malicious Updates Next Video: SQL Injection >> One of the things you’ll constantly hear security professionals discuss is the need to keep operating systems patched to
Operating System Vulnerabilities – CompTIA Security+ SY0-701 – 2.3 Read More »
Many operating systems and applications perform automated updates. In this video, you’ll learn how attackers can use this feature to gain access to our systems. << Previous Video: Race Conditions Next Video: Operating System Vulnerabilities >> You often hear myself and many other security professionals tell you to always keep your operating systems up to
Malicious Updates – CompTIA Security+ SY0-701 – 2.3 Read More »
Most applications perform multiple transactions and processes at the same time. In this video, you’ll learn how attackers can take advantage of this characteristic with a race condition. << Previous Video: Buffer Overflows Next Video: Malicious Updates >> A race condition is when two events happen at nearly the same time with an application, and
Race Conditions – CompTIA Security+ SY0-701 – 2.3 Read More »
A poorly written application can be a useful vector for an attacker. In this video, you’ll learn how buffer overflows can be used to gain access to a remote system. << Previous Video: Memory Injections Next Video: Race Conditions >> A buffer overflow attack is one, where an attacker can write more than what is
Buffer Overflows – CompTIA Security+ SY0-701 – 2.3 Read More »
Attackers can manipulate information in RAM to gain elevated access. In this video, you’ll learn how memory and DLL injections are used in an attack. << Previous Video: Other Social Engineering Attacks Next Video: Buffer Overflows >> The software that runs on your computer all runs inside of memory. Nothing executes on your computer unless
Memory Injections – CompTIA Security+ SY0-701 – 2.3 Read More »
Attackers use many techniques to gain access to our systems. In this video, you’ll learn about misinformation campaigns and brand impersonation. << Previous Video: Watering Hole Attacks Next Video: Memory Injections >> One very effective social engineering technique is to disseminate incorrect information to others. Unlike something that’s a difference of opinion, misinformation and disinformation
Other Social Engineering Attacks – CompTIA Security+ SY0-701 – 2.2 Read More »
If an attacker can’t get into your network, then they’ll wait for you to come out. In this video, you’ll learn how watering hole attacks can be used to attack a company outside of their own network. << Previous Video: Impersonation Next Video: Other Social Engineering Attacks >> In previous videos, we’ve talked about how
Watering Hole Attacks – CompTIA Security+ SY0-701 – 2.2 Read More »