Quick Bite- 01 What is bug bounty, 02 Who implements, 03 Advantages, 04 How to become a bounty hunter, 05 Examples, 06 Conclusion
Quick Bite: 01 Introduction, 02 Types, 03 Real-life scenario, 04 Attack steps, 05 Impact, 06 Steps to prevent…
Quick Bite- 01 Payload Introduction, 02 Types of Payload, 03 Step by Step Demonstration
Quick Bite- 01 Various Attack vectors, 02 What is an exploit, 03 Metasploit Introduction, 04 Modules, 05 Basic commands
Did you Give-up this Question – Not Anymore | Here is a Quick Bite – ILOVEYOU, Code Red, Stuxnet, MyDoom, CryptoLocker.
Quick Bite – 01 Packet filtering firewalls, 02 Circuit-level gateways, 03 Application-level gateways, 04 UTM firewalls | Get a brief Use Case on Each.
Quick Bite – 01 Data Breaches, 02 Weak Identity, Credential and Access Management, 03 Insecure APIs, 04 System and Application Vulnerabilities.
Quick Bite – What is #IoT?, Understanding the threats of IoT, Mitigation, 04 Other concerns gives Little Awareness of #Iot Use cases.
Quick Bite – Introduction, Download & Install, Wireshark GUI, Capture network packets, Colour coding, Analyze captured content, Statistics.
We’ll be using two built in Kali Tools – Arpspoof Wireshark & Ettercap | MITM is one of the classic hacks and on a LAN connection.