CompTIA Security+ SY0-601

Other Application Attacks – SY0-601 CompTIA Security+ : 1.3

There are many options available for the knowledgeable attacker. In this video, you’ll learn about memory vulnerabilities, directory traversal, improper error handling, API attacks, and resource exhaustion. << Previous Video: Race Conditions Next: Rogue Access Points and Evil Twins >>     If an attacker can manipulate the memory of a device, then they can […]

Other Application Attacks – SY0-601 CompTIA Security+ : 1.3 Read More »

Race Conditions – SY0-601 CompTIA Security+ : 1.3

Developers must plan for every possible contingency. In this video, you’ll learn how attackers can use race conditions to exploit applications and systems. << Previous Video: SSL Stripping Next: Other Application Attacks >> In today’s modern computing environments, there are a lot of different things all happening at the same time. And developers have to

Race Conditions – SY0-601 CompTIA Security+ : 1.3 Read More »

Driver Manipulation – SY0-601 CompTIA Security+ : 1.3

If they can’t infect your application, an attacker might try infecting your drivers. In this video, you’ll learn about driver manipulation and how shimming and refactoring can be used to exploit your operating system. << Previous Video: Request Forgeries Next: SSL Stripping >>     The anti-virus and anti-malware software that we run on our

Driver Manipulation – SY0-601 CompTIA Security+ : 1.3 Read More »

Request Forgeries title slide

Request Forgeries – SY0-601 CompTIA Security+ : 1.3

An attacker can take advantage of legitimate cross-site requests and turn them into a malicious exploit. In this video, you’ll learn about cross-site request forgeries and server-side request forgeries. << Previous Video: Replay Attacks Next: Driver Manipulation >>     In this video, we’re going to talk a lot about cross site request. This is

Request Forgeries – SY0-601 CompTIA Security+ : 1.3 Read More »

Cross-site Scripting – SY0-601 CompTIA Security+ : 1.3

Cross-site scripting takes advantaged of a trusted browser to attack other systems. In this video, you’ll learn about reflected and stored XSS attacks and I’ll demonstrate a cross-site scripting attack on a vulnerable system. << Previous Video: Privilege Escalation Next: Injection Attacks >>     In this video, we’ll describe some techniques around cross-site scripting.

Cross-site Scripting – SY0-601 CompTIA Security+ : 1.3 Read More »

Privilege Escalation – SY0-601 CompTIA Security+ : 1.3

Some attacks can use an existing user account to gain elevated access. In this video, you’ll learn about privilege escalation vulnerabilities and how to prevent them. << Previous Video: Cryptographic Attacks Next: Cross-site Scripting >>     We often worry about an attacker getting administrative login rights or some type of route log in to

Privilege Escalation – SY0-601 CompTIA Security+ : 1.3 Read More »