Getting the Data Out Using Social Media
Offered By: YouTube
Course Description
Overview
Learn about data exfiltration techniques using social media platforms in this 21-minute conference talk from BSidesLV 2015. Explore the concept of the "sneaky creeper" and its implications for cybersecurity. Discover various modules and tools used for data extraction, including Github, Twitter, and Textsecure. Examine defensive strategies, multichannel capabilities, and message size limits. Gain insights into exfil checksum methods and understand the potential risks associated with social media-based data exfiltration.
Syllabus
Introduction
Firewall
Logo
What is the sneaky creeper
Testing
Demo
In the wild
Feedback
What modules do you want
Github
Twitter
Textsecure
Defenses
Multichannel capability
Message size limits
Exfil
checksum
Related Courses
E-learning and Digital CulturesUniversity of Edinburgh via Coursera Surviving Disruptive Technologies (On Demand)
University of Maryland, College Park via Coursera Understanding Media by Understanding Google
Northwestern University via Coursera Content Strategy for Professionals: Engaging Audiences
Northwestern University via Coursera الإعلام الإجتماعي
Rwaq (رواق)