Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Learn Server Security With BitNinja
Introduction
Promo Video (2:00)
Let's meet (5:30)
Lab Setup (1:46)
Lab Setup - Login Information and Download Links
Overview of a Wordpress attack
Commands to be used in the next section
Scanning for wordpress vulnerabilities (10:26)
Exploiting a remote code execution vulnerability (9:18)
Uploading a backdoor
Sending spam (17:20)
Basics
Registration and Installation - Useful Information
Registration and installation (8:51)
IP Reputations. IP lists - User vs Global lists. Greylisting, Blacklists, Whitelist (16:57)
HTTP CAPTCHA (8:35)
SMTP CAPTHCA (4:27)
Commands used in SSLTerminating Lecture
SslTerminating Module (32:12)
SslTerminating Module - Adding Certs Manually (5:00)
Proactive protection mechanisms
Commands to be used in this section
Port Honeypots (7:57)
Web Honeypots (10:11)
DoS Detection and Protection (10:53)
Log Analysis (3:17)
WAF - Web Application Firewall (20:33)
Demo - Log Analysis and WAF (8:29)
Reactive protection mechanisms
Malware Detection (6:57)
Outbound WAF (2:04)
Demo - Malware Detection and Outbound WAF (11:33)
Blacklist/Whitelist and Country level blacklist/whitelist (11:35)
bitninja-cli (7:42)
The "How To" Section
How to find the source of an infection (9:41)
How to find the source of spamming (16:38)
How to find the source of outbound attacks (10:56)
Security daily routine (4:58)
Attack trend analysis (4:55)
Troubleshooting
CDN integrations (4:23)
Finding a trouble-maker IP (9:34)
Further Reading
How to find the source of an infection
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock