YoVDO

Malware Protocol Simulations in Distributed Networks

Offered By: Hack In The Box Security Conference via YouTube

Tags

Hack In The Box Security Conference Courses Cybersecurity Courses

Course Description

Overview

Explore advanced techniques for simulating malware protocols in distributed networks during this HITB2021SIN conference talk. Delve into the challenges of identifying malicious activities in large networks and the complexities of conducting realistic simulations without using actual malware. Learn about Tehsat, an open-source defensive tool developed to facilitate safe and easy C2 simulations across various protocols. Discover how to create custom profiles, design simulations, and utilize C2 command mocking through agents. Gain insights into analyzing cyber data analytics infrastructure efficiency, planting flags for incident response teams, and conducting safe purple team exercises. Understand the differences between various C2 channels and their real-world implementations, and explore ways to simulate long-term threat actor presence and build resilience against these activities.

Syllabus

Intro
Agenda
Introduction
Trade actor campaigns
Solarigate
Trade Actor Perspective
Red Team
Red Team Exercise
Cyber Analytics
C2 Activities
TA505
Patek
Deployment
Solution
Trade Actors
Tassat
IceID
Monitoring


Taught by

Hack In The Box Security Conference

Related Courses

Browser Hacking With ANGLE
Hack In The Box Security Conference via YouTube
Can A Fuzzer Match A Human
Hack In The Box Security Conference via YouTube
Biometrics System Hacking in the Age of the Smart Vehicle
Hack In The Box Security Conference via YouTube
ICEFALL - Revisiting A Decade Of OT Insecure-By-Design Practices
Hack In The Box Security Conference via YouTube
Fuzzing the MCU of Connected Vehicles for Security and Safety
Hack In The Box Security Conference via YouTube