Kiosk Breakouts - Restricted Environments To Complete Access
Published 10/2024
Created by Moreblessing Matake
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 13 Lectures ( 1h 37m ) | Size: 717 MB
Hands-On How Red Teamers and Threat Actors (APT) Breakout Kiosk Enviroments in the Real World
What you'll learn:
Kiosk Breakouts
Ethical Hacking
Cyber Security
Thinking outside the box
Nothing is secure
No System is safe
Requirements:
A computer with 4GB ram to support 1 VM running
Basic understanding of operating systems
Strong will to learn & creative mindset
If you like Hands-On, well this is the course for you, we do Hands-On here
Description:
As public kiosks become more widespread in various industries, from retail to transportation, ensuring their security is critical. This course delves into kiosk breakouts-a technique used by attackers to escape the restricted environments of kiosks, such as ATMs, self-service terminals, and information kiosks, to gain unauthorized access to the underlying system. Understanding how these breakouts occur and, more importantly, how to prevent them is vital for maintaining secure public systems.In this course, participants will learn the different methods attackers use to exploit kiosk vulnerabilities, including bypassing operating system restrictions, escaping user interface sandboxes, exploiting browser vulnerabilities, and leveraging physical access. Students will also explore the defensive techniques used to mitigate these attacks, such as properly configuring kiosk modes, securing browsers, enforcing network access controls, and monitoring for suspicious activity.Hands-on labs will allow participants to engage directly with real-world scenarios, practicing how to secure kiosk systems, detect potential intrusions, and apply security measures to minimize risk. By studying both offensive and defensive tactics, learners will gain a holistic understanding of how to protect kiosks from emerging threats.By the end of the course, students will have developed the technical expertise to secure public kiosks against potential breakouts, making it ideal for cybersecurity professionals, IT administrators, and anyone tasked with managing or securing these systems. Graduates will be prepared to implement effective countermeasures to protect critical kiosk infrastructure.
Who this course is for:
Red Teamers - Leveling their skills in their world of compromising systems & evading security mechanism
Blue Teamer - Learn how threat actors work or move in the wild, so they can defend better, protect their systems and educate their fellow workers for better security
Any-One - Off course, anyone in the Cyber Security field who just wanna learn or know how threat actors act in the wild
Homepage
Code:
Bitte
Anmelden
oder
Registrieren
um Code Inhalt zu sehen!