Play by Play: Exploring the Internet of Vulnerabilities

This Play by Play will explore "the Internet of vulnerabilities", that is to draw awareness to how fundamentally flawed much of the Internet is.
Course info
Rating
(76)
Level
Beginner
Updated
Nov 11, 2016
Duration
58m
Table of contents
Description
Course info
Rating
(76)
Level
Beginner
Updated
Nov 11, 2016
Duration
58m
Description

We're seeing a lot of attacks against large online assets that are being successfully executed by very under-skilled adversaries, very often children. Much of the reason behind this is due to very low-hanging vulnerabilities that are easily exploited combined with a prevalence of tools that make it a simple task for anyone with a bit of curiosity. In this Play by Play, you'll explore "the Internet of vulnerabilities", that is to draw awareness to how fundamentally flawed much of the Internet is.

About the author
About the author

Troy Hunt is a Microsoft Regional Director and MVP for Developer Security. He's a regular conference speaker, frequent blogger at troyhunt.com and is the creator of the data breach notification service known as “Have I Been Pwned”.

More from the author
Ethical Hacking: Denial of Service
Beginner
2h 49m
Sep 17, 2019
Ethical Hacking: SQL Injection
Beginner
5h 25m
Sep 16, 2019
Ethical Hacking: Session Hijacking
Beginner
3h 27m
Sep 16, 2019
More courses by Troy Hunt
About the author

Niall is a solutions architect and security professional based in Norway. He specializes in Web Application, Network, and Social Engineering style attacks and can be found travelling the world, telling people how these attacks work.