YoVDO

Unexpected Shells with "covertutils"

Offered By: DefCamp via YouTube

Tags

DefCamp Courses Covert Communication Courses

Course Description

Overview

Explore the world of unexpected shells using "covertutils" in this 50-minute conference talk from DefCamp 2017. Dive into advanced hacking and information security techniques as presented at one of Central and Eastern Europe's most significant cybersecurity events. Learn how to leverage "covertutils" for creating unconventional shell access, gaining insights into cutting-edge INFOSEC practices. Discover the latest research and hands-on applications in the field of cybersecurity, as shared by industry experts and decision-makers. Enhance your understanding of covert communication methods and their potential implications for network security.

Syllabus

DefCamp 2017 - Unexpected Shells with “covertutils”


Taught by

DefCamp

Related Courses

The Model of Post-Quantum Signature Using Verkle Tree - DefCamp - 2022
DefCamp via YouTube
The Anatomy of Wiper Malware - DefCamp - 2022
DefCamp via YouTube
Internet Balkanization in an Era of Military Conflict - Dan Demeter - DefCamp - 2022
DefCamp via YouTube
How We Analyzed and Built an Exploit PoC for CVE-2022-24086, a Magento RCE - Catalin Filip - DefCamp - 2022
DefCamp via YouTube
To Log, or Not to Log! That Is the Question - DefCamp - 2022
DefCamp via YouTube