Detecting and Defending Against State-Actor Surveillance
Offered By: OWASP Foundation via YouTube
Course Description
Overview
Explore techniques for detecting and defending against state-sponsored surveillance in this 18-minute OWASP Foundation conference talk. Analyze recently leaked secret documents revealing technological spying methods employed by well-funded state actors. Learn about alleged surveillance bugs, their potential workings, and compile effective defense and detection strategies. Discover methods for preventing and detecting RF bugs, identifying data exfiltration attempts, and recognizing persistent compromise devices. Examine software exploits, BIOS/firmware/CF card hacks, WiFi device vulnerabilities, and cell phone bugs. Gain insights into critical thinking approaches for addressing targeted surveillance by state-sponsored spy agencies, and access further reading materials and sources for continued learning.
Syllabus
Detecting & Defending Against State-Actor Surveillance
Intro
Breakdown
Surveillance Skymall leaks
Retro Reflectors
RF Bug Prevention
RF Bug Detection
Data Exfiltration
Detecting Persistent Compromise Devices
Software Exploits
BIOS/Firmware/CF Card Hacked?
Wifi Devices
Cell Phone Bugs
Conclusions
Further Reading & Sources
Taught by
OWASP Foundation
Related Courses
Python 3 For Offensive PenTest: A Complete Practical CourseUdemy Python for Command-and-control, Exfiltration and Impact
Infosec via Coursera Network Analysis with Arkime
Pluralsight Cisco Core Security: Secure Network Access, Visibility, and Enforcement
Pluralsight Post Exploitation with Meterpreter
Pluralsight