Head to [ Ссылка ] to start your free 30-day trial, and get 20% off an annual premium subscription.
PART ONE 👉 [ Ссылка ]
In this video, we take a deep dive into EternalBlue, the infamous exploit behind many of the most impactful cyber-attacks, such as WannaCry, NotPetya, TrickBot, and more. This is the most sophisticated exploit I have covered on this channel, due to the sheer rigor and length of the exploit chain. I wanted to build up to a comprehensive understanding of the exploit, starting with the buffer overflow / out-of-bounds write, as well as the arbitrary memory allocation, before outlining how the attack is executed. Whether you're a pen tester, security researcher, or cyber security expert, I hope you'll find this attack as fascinating as I did.
JOIN THE DISCORD! 👉 [ Ссылка ]
EternalBlue technical sources:
[ Ссылка ]
[ Ссылка ]
[ Ссылка ]
[ Ссылка ]
[ Ссылка ]
[ Ссылка ]
EternalBlue non-technical sources:
[ Ссылка ]
[ Ссылка ]
[ Ссылка ]
[ Ссылка ]
[ Ссылка ]
[ Ссылка ]
[ Ссылка ]
[ Ссылка ]
SMB documentation:
[ Ссылка ]
MUSIC CREDITS:
LEMMiNO - Cipher
[ Ссылка ]
CC BY-SA 4.0
LEMMiNO - Firecracker
[ Ссылка ]
CC BY-SA 4.0
LEMMiNO - Nocturnal
[ Ссылка ]
CC BY-SA 4.0
LEMMiNO - Siberian
[ Ссылка ]
CC BY-SA 4.0
LEMMiNO - Encounters
[ Ссылка ]
CC BY-SA 4.0
#programming #software #softwareengineering #computerscience #code #hacking #hack #cybersecurity #exploit #tracking #softwareengineer #vulnerability #pentesting #privacy #spyware #malware #cyber #cyberattack #zeroday #security #cybersecurity #breaches #databreaches #bug #bugbounty #pentesting #penetrationtesting #backdoor #hacked #CPU #eternalblue #wannacry #notpetya #ransomware #worms #computerworm #NSA #leak #bufferoverflow #memory #exploitchain #zeroclick #microsoftexploit #windowsexploit #cyberattack
oops...
Теги
programmingsoftwaresoftwareengineeringcomputersciencecodehackinghackcybersecurityexploittrackingsoftwareengineervulnerabilitypentestingprivacyspywaremalwarecybercyberattackzerodaysecuritycyber securitybreachesdata breachesbugbug bountypen testingpenetration testingbackdoorhackedCPUeternalbluewannacrynotpetyaransomwarewormscomputer wormNSAleakbuffer overflowmemoryexploit chainzero clickmicrosoft exploitwindows exploitcyber attack