Shared by: isp11018
SPEAKER:NIMROD LURIA, Q.RITY LTD HACKING IN THE REAL WORLD Learn how hackers work and how to build hacking resistance applications ABOUT THIS COURSE: Hacking in the real world was developed to give the participates a lot of information about how hackers breaks into applications and servers to get access to unauthorized data and how you should defend against it based on real cases. THE REASON FOR ATTACKING THE ATTACKING THE TOOLS AGENDA DEFENSE IN DEPT HOST APPLICATION • capturing • the Metasploit • Application overview of passwords on project and level attacks. tools to attack the wire. other tools to • web 2.0 at- and defend web • dumping se- attack the tacks. applications. crets from host. • script injec- memory. • unauthorized tion- why the student will • attacking win- access to the can’t we trust get the knowl- dows based host using a simple gif edge which tools machines. application file. to use for each • attacking the level weak- • new attacking task on the path application. nesses. and defending of defending the • man in the techniques. applications. endpoint at- tacks.