Unexpected Shells with "covertutils"
Offered By: DefCamp via YouTube
Course Description
Overview
Explore the world of unexpected shells using "covertutils" in this 50-minute conference talk from DefCamp 2017. Dive into advanced hacking and information security techniques as presented at one of Central and Eastern Europe's most significant cybersecurity events. Learn how to leverage "covertutils" for creating unconventional shell access, gaining insights into cutting-edge INFOSEC practices. Discover the latest research and hands-on applications in the field of cybersecurity, as shared by industry experts and decision-makers. Enhance your understanding of covert communication methods and their potential implications for network security.
Syllabus
DefCamp 2017 - Unexpected Shells with “covertutils”
Taught by
DefCamp
Related Courses
The Model of Post-Quantum Signature Using Verkle Tree - DefCamp - 2022DefCamp via YouTube The Anatomy of Wiper Malware - DefCamp - 2022
DefCamp via YouTube Internet Balkanization in an Era of Military Conflict - Dan Demeter - DefCamp - 2022
DefCamp via YouTube How We Analyzed and Built an Exploit PoC for CVE-2022-24086, a Magento RCE - Catalin Filip - DefCamp - 2022
DefCamp via YouTube To Log, or Not to Log! That Is the Question - DefCamp - 2022
DefCamp via YouTube