YoVDO

Hacking Exposed - Real-World Tradecraft of Bears, Pandas and Kittens

Offered By: RSA Conference via YouTube

Tags

RSA Conference Courses Cybersecurity Courses Credential Theft Courses

Course Description

Overview

Explore real-world case studies of advanced cyber intrusions in this 47-minute conference talk from RSA Conference. Delve into demos and mitigation strategies for high-profile hacks, including the Democratic National Committee breach, as presented by Dmitri Alperovitch, Co-Founder and CTO of CrowdStrike. Gain insights into the tradecraft of state-sponsored threat actors like Bears, Pandas, and Kittens. Learn about initial infection tactics using malicious LNK files and macro documents, privilege escalation techniques involving UACME and kernel exploits, credential theft methods, persistence mechanisms through WMI event subscriptions and service DLLs, and exfiltration strategies employing disguised RAR files. Understand the power of cyber threat intelligence and discover effective countermeasures to protect against sophisticated cyber attacks.

Syllabus

Intro
POWER OF THE ACADEMY
INITIAL INFECTION: BEAR TACTIC - MALICIOUS LNK
LNK FILE COMPONENTS
LNK FILE CONSTRUCTION
INITIAL INFECTION: PANDA TACTIC - MACRO DOCUMENT
PRIVILEGE ESCALATION: BEAR TACTIC - UACME #23
HIGH LEVEL EXPLANATION: USMDISM METHOD
PRIVILEGE ESCALATION: PANDA TACTIC - KERNEL O-DAY
CREDENTIAL THEFT: BEAR & PANDA - IT'S A TIE!
PERSISTENCE: BEAR TACTIC - WMI EVENT SUBSCRIPTION
WMI EVENT SUBSCRIPTION BREAKDOWN
PERSISTENCE: PANDA TACTIC - SERVICEDLL
REGISTERING THE SERVICE
COUNTERMEASURES
EXFILTRATION: PANDA TACTIC - DISGUISED RAR


Taught by

RSA Conference

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network