What's Inside the Open Directory From 96 Different Threat Actors - Understanding Threat Actor TTPs
Security BSides London via YouTube
Google, IBM & Microsoft Certificates — All in One Plan
You’re only 3 weeks away from a new language
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a revealing Security BSides London conference talk that delves into the operational methods of 96 different threat actors who inadvertently exposed their systems through open directories. Learn how these actors, ranging from script kiddies to alleged Advanced Persistent Threats (APTs), unintentionally provided unprecedented access to their command histories, system configurations, source code, and detailed log files. Gain valuable insights into threat actor tactics, techniques, and procedures (TTPs) through direct examination of their operational data rather than post-incident analysis. Discover accurate geolocation data, targeting patterns, tool preferences, and command execution patterns that provide a unique window into threat actor behaviors and methodologies.
Syllabus
What’s Inside The Open Directory From 96 Different Threat Actors? - Alana Witten
Taught by
Security BSides London