SY0-601 Videos

Bluejacking and Bluesnarfing – SY0-601 CompTIA Security+ : 1.4

Bluetooth technology is now quite robust and secure, but it wasn’t always that way. In this video, you’ll learn about unwanted Bluejacking messages and how attackers were able to retrieve information from your phone with Bluesnarfing. << Previous Video: Rogue Access Points and Evil Twins Next: Wireless Disassociation Attacks >> Bluejacking is an attacker sending …

Bluejacking and Bluesnarfing – SY0-601 CompTIA Security+ : 1.4 Read More »

Rogue Access Points and Evil Twins – SY0-601 CompTIA Security+ : 1.4

An unwanted wireless access point can be a significant security concern. In this video, you’ll learn about rogue access points, evil twins, and how to prevent or limit the use these wireless technologies. << Previous Video: Other Application Attacks Next: Bluejacking and Bluesnarfing >> A rogue access point is an access point that has been …

Rogue Access Points and Evil Twins – SY0-601 CompTIA Security+ : 1.4 Read More »

Other Application Attacks – SY0-601 CompTIA Security+ : 1.3

There are many options available for the knowledgeable attacker. In this video, you’ll learn about memory vulnerabilities, directory traversal, improper error handling, API attacks, and resource exhaustion. << Previous Video: Race Conditions Next: Rogue Access Points and Evil Twins >>     If an attacker can manipulate the memory of a device, then they can …

Other Application Attacks – SY0-601 CompTIA Security+ : 1.3 Read More »

Race Conditions – SY0-601 CompTIA Security+ : 1.3

Developers must plan for every possible contingency. In this video, you’ll learn how attackers can use race conditions to exploit applications and systems. << Previous Video: SSL Stripping Next: Other Application Attacks >> In today’s modern computing environments, there are a lot of different things all happening at the same time. And developers have to …

Race Conditions – SY0-601 CompTIA Security+ : 1.3 Read More »

Driver Manipulation – SY0-601 CompTIA Security+ : 1.3

If they can’t infect your application, an attacker might try infecting your drivers. In this video, you’ll learn about driver manipulation and how shimming and refactoring can be used to exploit your operating system. << Previous Video: Request Forgeries Next: SSL Stripping >>     The anti-virus and anti-malware software that we run on our …

Driver Manipulation – SY0-601 CompTIA Security+ : 1.3 Read More »

Request Forgeries title slide

Request Forgeries – SY0-601 CompTIA Security+ : 1.3

An attacker can take advantage of legitimate cross-site requests and turn them into a malicious exploit. In this video, you’ll learn about cross-site request forgeries and server-side request forgeries. << Previous Video: Replay Attacks Next: Driver Manipulation >>     In this video, we’re going to talk a lot about cross site request. This is …

Request Forgeries – SY0-601 CompTIA Security+ : 1.3 Read More »

Buffer Overflows – SY0-601 CompTIA Security+ : 1.3

A vulnerable application can allow memory buffers to be manipulated by a crafty attacker. In this video, you’ll learn about buffer overflow vulnerabilities and how they can be used by an attacker. << Previous Video: Injection Attacks Next: Replay Attacks >>     A buffer overflow attack occurs when one section of memory is able …

Buffer Overflows – SY0-601 CompTIA Security+ : 1.3 Read More »