Kiosk Breakouts - Restricted Environments To Complete Access - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: Kiosk Breakouts - Restricted Environments To Complete Access (/Thread-Kiosk-Breakouts-Restricted-Environments-To-Complete-Access) |
Kiosk Breakouts - Restricted Environments To Complete Access - AD-TEAM - 10-25-2024 Kiosk Breakouts - Restricted Environments To Complete Access Published 10/2024 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz Language: English | Size: 677.85 MB | Duration: 1h 37m Hands-On How Red Teamers and Threat Actors (APT) Breakout Kiosk Enviroments in the Real World
[b]What you'll learn[/b] Kiosk Breakouts Ethical Hacking Cyber Security Thinking outside the box Nothing is secure No System is safe [b]Requirements[/b] A computer with 4GB ram to support 1 VM running Basic understanding of operating systems Strong will to learn & creative mindset If you like Hands-On, well this is the course for you, we do Hands-On here [b]Description[/b] As public kiosks become more widespread in various industries, from retail to transportation, ensuring their security is critical. This course delves into kiosk breakouts-a technique used by attackers to escape the restricted environments of kiosks, such as ATMs, self-service terminals, and information kiosks, to gain unauthorized access to the underlying system. Understanding how these breakouts occur and, more importantly, how to prevent them is vital for maintaining secure public systems.In this course, participants will learn the different methods attackers use to exploit kiosk vulnerabilities, including bypassing operating system restrictions, escaping user interface sandboxes, exploiting browser vulnerabilities, and leveraging physical access. Students will also explore the defensive techniques used to mitigate these attacks, such as properly configuring kiosk modes, securing browsers, enforcing network access controls, and monitoring for suspicious activity.Hands-on labs will allow participants to engage directly with real-world scenarios, practicing how to secure kiosk systems, detect potential intrusions, and apply security measures to minimize risk. By studying both offensive and defensive tactics, learners will gain a holistic understanding of how to protect kiosks from emerging threats.By the end of the course, students will have developed the technical expertise to secure public kiosks against potential breakouts, making it ideal for cybersecurity professionals, IT administrators, and anyone tasked with managing or securing these systems. Graduates will be prepared to implement effective countermeasures to protect critical kiosk infrastructure. Overview Section 1: Course Prelude Lecture 1 Introduction Lecture 2 Intro To Kiosk Breakouts Section 2: 2. Lab Setup & Configuration Lecture 3 Welcome Lecture 4 Installing VMware Pro Lecture 5 Downloading Kali & Windows 11 VM Lecture 6 Setting Up Machines On VMware Lecture 7 Getting Windows 11 VM Ready Section 3: 3. Kiosk Breaking Outs Lecture 8 Bulidng Kiosk Environment - Easy Mode Lecture 9 Kiosk Breakout - Easy Mode Lecture 10 Bulidng Kiosk Environment - Hard Mode Lecture 11 Keep In Mind Lecture 12 Kiosk Breakout - Hard Mode Section 4: 4. Wrap Up Lecture 13 Wrap Up Red Teamers - Leveling their skills in their world of compromising systems & evading security mechanism,Blue Teamer - Learn how threat actors work or move in the wild, so they can defend better, protect their systems and educate their fellow workers for better security,Any-One - Off course, anyone in the Cyber Security field who just wanna learn or know how threat actors act in the wild |