YoVDO

Automatic Discovery of Evasion Vulnerabilities Using Targeted Protocol Fuzzing

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Network Security Courses Vulnerability Testing Courses

Course Description

Overview

Explore the world of network protocol vulnerabilities in this 45-minute Black Hat conference talk. Delve into the complexities of network protocol normalization and reassembly, which form the foundation of traffic inspection in Next-Generation Firewalls (NGFW) and Intrusion Prevention Systems (IPS). Learn about evasion techniques, their detection, and the reasons behind evasive vulnerabilities. Discover the innovative "Mong Bath" approach for testing and recording successful attacks. Gain insights into key findings, challenges, and recommended policies for enhancing network security. Witness a live demo and discuss future updates in the field of automatic discovery of evasion vulnerabilities using targeted protocol fuzzing.

Syllabus

Introduction
Title
What is an evasion
Why do we do this
How do you detect evasive attacks
Why do we have evasive vulnerabilities
Why we have evasive vulnerabilities
Evasion Aware
Test Traffic Inspection
How to Test
Mong Bath
Recording Successful Attacks
Results
Pulse Elimination
Challenges
Key Findings
Availability
Demo
Recommended Policies
Multiple Firewalls
Future Updates


Taught by

Black Hat

Related Courses

Certified WhiteHat Hacker Level 1 ( CWHH Level 1)
Udemy
Online Application Security Testing Essential Training
LinkedIn Learning
Building a Cybersecurity Home Lab Environment
Pluralsight
Bug Bounty Methodology
YouTube
Uncle Rat's Web Application Hacking And Bug Bounty Guide
Udemy