What's Inside the Open Directory From 96 Different Threat Actors - Understanding Threat Actor TTPs
Security BSides London via YouTube
Learn Backend Development Part-Time, Online
AI Adoption - Drive Business Value and Organizational Impact
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a revealing Security BSides London conference talk that delves into the operational methods of 96 different threat actors who inadvertently exposed their systems through open directories. Learn how these actors, ranging from script kiddies to alleged Advanced Persistent Threats (APTs), unintentionally provided unprecedented access to their command histories, system configurations, source code, and detailed log files. Gain valuable insights into threat actor tactics, techniques, and procedures (TTPs) through direct examination of their operational data rather than post-incident analysis. Discover accurate geolocation data, targeting patterns, tool preferences, and command execution patterns that provide a unique window into threat actor behaviors and methodologies.
Syllabus
What’s Inside The Open Directory From 96 Different Threat Actors? - Alana Witten
Taught by
Security BSides London