Softwarez.Info - Software's World!
Kiosk Breakouts - Restricted Environments To Complete Access - Printable Version

+- Softwarez.Info - Software's World! (https://softwarez.info)
+-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone)
+--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials)
+--- Thread: Kiosk Breakouts - Restricted Environments To Complete Access (/Thread-Kiosk-Breakouts-Restricted-Environments-To-Complete-Access)



Kiosk Breakouts - Restricted Environments To Complete Access - AD-TEAM - 10-25-2024

[Image: 493eed4e3a05eb82ef5ae2ff2d9139bf.jpg]
Kiosk Breakouts - Restricted Environments To Complete Access
Published 10/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 677.85 MB | Duration: 1h 37m

Hands-On How Red Teamers and Threat Actors (APT) Breakout Kiosk Enviroments in the Real World

[b]What you'll learn[/b]

Kiosk Breakouts

Ethical Hacking

Cyber Security

Thinking outside the box

Nothing is secure

No System is safe

[b]Requirements[/b]

A computer with 4GB ram to support 1 VM running

Basic understanding of operating systems

Strong will to learn & creative mindset

If you like Hands-On, well this is the course for you, we do Hands-On here

[b]Description[/b]

As public kiosks become more widespread in various industries, from retail to transportation, ensuring their security is critical. This course delves into kiosk breakouts-a technique used by attackers to escape the restricted environments of kiosks, such as ATMs, self-service terminals, and information kiosks, to gain unauthorized access to the underlying system. Understanding how these breakouts occur and, more importantly, how to prevent them is vital for maintaining secure public systems.In this course, participants will learn the different methods attackers use to exploit kiosk vulnerabilities, including bypassing operating system restrictions, escaping user interface sandboxes, exploiting browser vulnerabilities, and leveraging physical access. Students will also explore the defensive techniques used to mitigate these attacks, such as properly configuring kiosk modes, securing browsers, enforcing network access controls, and monitoring for suspicious activity.Hands-on labs will allow participants to engage directly with real-world scenarios, practicing how to secure kiosk systems, detect potential intrusions, and apply security measures to minimize risk. By studying both offensive and defensive tactics, learners will gain a holistic understanding of how to protect kiosks from emerging threats.By the end of the course, students will have developed the technical expertise to secure public kiosks against potential breakouts, making it ideal for cybersecurity professionals, IT administrators, and anyone tasked with managing or securing these systems. Graduates will be prepared to implement effective countermeasures to protect critical kiosk infrastructure.

Overview

Section 1: Course Prelude

Lecture 1 Introduction

Lecture 2 Intro To Kiosk Breakouts

Section 2: 2. Lab Setup & Configuration

Lecture 3 Welcome

Lecture 4 Installing VMware Pro

Lecture 5 Downloading Kali & Windows 11 VM

Lecture 6 Setting Up Machines On VMware

Lecture 7 Getting Windows 11 VM Ready

Section 3: 3. Kiosk Breaking Outs

Lecture 8 Bulidng Kiosk Environment - Easy Mode

Lecture 9 Kiosk Breakout - Easy Mode

Lecture 10 Bulidng Kiosk Environment - Hard Mode

Lecture 11 Keep In Mind

Lecture 12 Kiosk Breakout - Hard Mode

Section 4: 4. Wrap Up

Lecture 13 Wrap Up

Red Teamers - Leveling their skills in their world of compromising systems & evading security mechanism,Blue Teamer - Learn how threat actors work or move in the wild, so they can defend better, protect their systems and educate their fellow workers for better security,Any-One - Off course, anyone in the Cyber Security field who just wanna learn or know how threat actors act in the wild

[Image: kLIQ0s5W_o.jpg]

[To see links please register or login]

[To see links please register or login]

[To see links please register or login]