Getting the Data Out Using Social Media
Offered By: YouTube
Course Description
Overview
Learn about data exfiltration techniques using social media platforms in this 21-minute conference talk from BSidesLV 2015. Explore the concept of the "sneaky creeper" and its implications for cybersecurity. Discover various modules and tools used for data extraction, including Github, Twitter, and Textsecure. Examine defensive strategies, multichannel capabilities, and message size limits. Gain insights into exfil checksum methods and understand the potential risks associated with social media-based data exfiltration.
Syllabus
Introduction
Firewall
Logo
What is the sneaky creeper
Testing
Demo
In the wild
Feedback
What modules do you want
Github
Twitter
Textsecure
Defenses
Multichannel capability
Message size limits
Exfil
checksum
Related Courses
Introduction to Agile Software Development: Tools & TechniquesUniversity of California, Berkeley via edX Advanced Topics and Techniques in Agile Software Development
University of California, Berkeley via edX The Data Scientist’s Toolbox
Johns Hopkins University via Coursera How to Use Git and GitHub
Udacity Desarrollo de Videojuegos 3D en Unity: Una Introducción
Universidad de los Andes via Coursera