Hunting Webshells - Tracking TwoFace
Offered By: YouTube
Course Description
Overview
Explore the intricacies of hunting webshells and tracking TwoFace in this 45-minute conference talk from Derbycon 2019. Delve into the methodology behind TwoFace's operations, analyze command prompt techniques, and examine host-side analysis strategies. Learn effective mitigation tactics to protect against webshell threats. Gain valuable insights from security experts Josh Bryant and Robert Falcone as they share their expertise on this critical cybersecurity topic.
Syllabus
Intro
TwoFace
What They Did
Command Prompt Dish
Host Side Analysis
Mitigation
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network