Kiosk Breakouts - Restricted Environments To Complete Access

xodynu

U P L O A D E R
880f45e3733941a07210b66913ed3c95.jpg

Kiosk Breakouts - Restricted Environments To Complete Access
Published 10/2024
Created by Moreblessing Matake
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 13 Lectures ( 1h 37m ) | Size: 717 MB



Hands-On How Red Teamers and Threat Actors (APT) Breakout Kiosk Enviroments in the Real World
[/center]
What you'll learn:
Kiosk Breakouts
Ethical Hacking
Cyber Security
Thinking outside the box
Nothing is secure
No System is safe
Requirements:
A computer with 4GB ram to support 1 VM running
Basic understanding of operating systems
Strong will to learn & creative mindset
If you like Hands-On, well this is the course for you, we do Hands-On here
Description:
As public kiosks become more widespread in various industries, from retail to transportation, ensuring their security is critical. This course delves into kiosk breakouts-a technique used by attackers to escape the restricted environments of kiosks, such as ATMs, self-service terminals, and information kiosks, to gain unauthorized access to the underlying system. Understanding how these breakouts occur and, more importantly, how to prevent them is vital for maintaining secure public systems.In this course, participants will learn the different methods attackers use to exploit kiosk vulnerabilities, including bypassing operating system restrictions, escaping user interface sandboxes, exploiting browser vulnerabilities, and leveraging physical access. Students will also explore the defensive techniques used to mitigate these attacks, such as properly configuring kiosk modes, securing browsers, enforcing network access controls, and monitoring for suspicious activity.Hands-on labs will allow participants to engage directly with real-world scenarios, practicing how to secure kiosk systems, detect potential intrusions, and apply security measures to minimize risk. By studying both offensive and defensive tactics, learners will gain a holistic understanding of how to protect kiosks from emerging threats.By the end of the course, students will have developed the technical expertise to secure public kiosks against potential breakouts, making it ideal for cybersecurity professionals, IT administrators, and anyone tasked with managing or securing these systems. Graduates will be prepared to implement effective countermeasures to protect critical kiosk infrastructure.
Who this course is for:
Red Teamers - Leveling their skills in their world of compromising systems & evading security mechanism
Blue Teamer - Learn how threat actors work or move in the wild, so they can defend better, protect their systems and educate their fellow workers for better security
Any-One - Off course, anyone in the Cyber Security field who just wanna learn or know how threat actors act in the wild
Homepage


Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
 
Kommentar

493eed4e3a05eb82ef5ae2ff2d9139bf.jpg

Kiosk Breakouts - Restricted Environments To Complete Access
Published 10/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 677.85 MB | Duration: 1h 37m​

Hands-On How Red Teamers and Threat Actors (APT) Breakout Kiosk Enviroments in the Real World

What you'll learn

Kiosk Breakouts

Ethical Hacking

Cyber Security

Thinking outside the box

Nothing is secure

No System is safe

Requirements

A computer with 4GB ram to support 1 VM running

Basic understanding of operating systems

Strong will to learn & creative mindset

If you like Hands-On, well this is the course for you, we do Hands-On here

Description

As public kiosks become more widespread in various industries, from retail to transportation, ensuring their security is critical. This course delves into kiosk breakouts-a technique used by attackers to escape the restricted environments of kiosks, such as ATMs, self-service terminals, and information kiosks, to gain unauthorized access to the underlying system. Understanding how these breakouts occur and, more importantly, how to prevent them is vital for maintaining secure public systems.In this course, participants will learn the different methods attackers use to exploit kiosk vulnerabilities, including bypassing operating system restrictions, escaping user interface sandboxes, exploiting browser vulnerabilities, and leveraging physical access. Students will also explore the defensive techniques used to mitigate these attacks, such as properly configuring kiosk modes, securing browsers, enforcing network access controls, and monitoring for suspicious activity.Hands-on labs will allow participants to engage directly with real-world scenarios, practicing how to secure kiosk systems, detect potential intrusions, and apply security measures to minimize risk. By studying both offensive and defensive tactics, learners will gain a holistic understanding of how to protect kiosks from emerging threats.By the end of the course, students will have developed the technical expertise to secure public kiosks against potential breakouts, making it ideal for cybersecurity professionals, IT administrators, and anyone tasked with managing or securing these systems. Graduates will be prepared to implement effective countermeasures to protect critical kiosk infrastructure.

Overview

Section 1: Course Prelude

Lecture 1 Introduction

Lecture 2 Intro To Kiosk Breakouts

Section 2: 2. Lab Setup & Configuration

Lecture 3 Welcome

Lecture 4 Installing VMware Pro

Lecture 5 Downloading Kali & Windows 11 VM

Lecture 6 Setting Up Machines On VMware

Lecture 7 Getting Windows 11 VM Ready

Section 3: 3. Kiosk Breaking Outs

Lecture 8 Bulidng Kiosk Environment - Easy Mode

Lecture 9 Kiosk Breakout - Easy Mode

Lecture 10 Bulidng Kiosk Environment - Hard Mode

Lecture 11 Keep In Mind

Lecture 12 Kiosk Breakout - Hard Mode

Section 4: 4. Wrap Up

Lecture 13 Wrap Up

Red Teamers - Leveling their skills in their world of compromising systems & evading security mechanism,Blue Teamer - Learn how threat actors work or move in the wild, so they can defend better, protect their systems and educate their fellow workers for better security,Any-One - Off course, anyone in the Cyber Security field who just wanna learn or know how threat actors act in the wild

kLIQ0s5W_o.jpg

Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
 
Kommentar

In der Börse ist nur das Erstellen von Download-Angeboten erlaubt! Ignorierst du das, wird dein Beitrag ohne Vorwarnung gelöscht. Ein Eintrag ist offline? Dann nutze bitte den Link  Offline melden . Möchtest du stattdessen etwas zu einem Download schreiben, dann nutze den Link  Kommentieren . Beide Links findest du immer unter jedem Eintrag/Download.

Data-Load.me | Data-Load.ing | Data-Load.to

Auf Data-Load.me findest du Links zu kostenlosen Downloads für Filme, Serien, Dokumentationen, Anime, Animation & Zeichentrick, Audio / Musik, Software und Dokumente / Ebooks / Zeitschriften. Wir sind deine Boerse für kostenlose Downloads!

Ist Data-Load legal?

Data-Load ist nicht illegal. Es werden keine zum Download angebotene Inhalte auf den Servern von Data-Load gespeichert.
Oben Unten