Video

Credential Stuffing Attacks Using Selenium and Python

On-Demand Webinar

Webinar by Dan Woods
Vice President | Threat Intelligence Shape Security

About this video

One of the most common ways cybercriminals perform account takeovers is via credential stuffing.
To learn more about this threat, Dan Woods, former FBI Special Agent and Director, Shape Intelligence will demonstrate how the Selenium Webdriver tool is used to perform credential stuffing attacks.

Fill out the form to get full video

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Policy.
prevent fraud icon

Prevent Fraud

Over half of all online fraud occurs because fraudsters are using stolen data to appear like real customers (this is also known as “clean fraud.”) Shape distinguishes fake users from real ones before they have the chance to commit fraudulent transactions.

gift card cracking icon

Gift Card Cracking

Gift cards are enumerated on websites and then resold to unsuspecting victims on third-party marketplaces. Retailers and e-commerce companies rely on Shape Enterprise Defense to prevent gift card cracking attacks.

eliminate bots icon

Eliminate Bots

Every website that is built for users gets abused by attackers using automation. Shape offers comprehensive anti-automation technology that is built on the same platform that defends 20% of Fortune 500 brands from imitation attacks.

Protect Your Online Business Today

Get Protected by Shape

Try Shape