top of page

Anatomy of a credential stuffing attack

In this webinar we take the hacker's perspective with a step-by-step guide and presentation of attack tools used by hackers.

You will learn what a credential stuffing attack is, and why it is so popular and what companies are usually targeted.


James Henry one of our Consulting Directors, Alan Lim a Penetration tester and Jan Broniowski from our development team discuss credential stuffing and how hackers go about using these techniques.



Opmerkingen


bottom of page