YoVDO

Hunting Webshells - Tracking TwoFace

Offered By: YouTube

Tags

DerbyCon Courses Cybersecurity Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of hunting webshells and tracking TwoFace in this 45-minute conference talk from Derbycon 2019. Delve into the methodology behind TwoFace's operations, analyze command prompt techniques, and examine host-side analysis strategies. Learn effective mitigation tactics to protect against webshell threats. Gain valuable insights from security experts Josh Bryant and Robert Falcone as they share their expertise on this critical cybersecurity topic.

Syllabus

Intro
TwoFace
What They Did
Command Prompt Dish
Host Side Analysis
Mitigation


Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network