Gathering Credentials Through Network Based Attacks | Serena DiPenti
2 videos • 527 views • by Black Hills Information Security In this Black Hills Information Security webcast, Serena will cover different techniques you can use to gather sensitive data and credentials by exploiting protocols through network-based attacks. Topics include: - spoofing - relays - proxies - tunnels - IPv6 attacks