YoVDO

Ghost Tunnel 2.0 - Blue Ghost

Offered By: Hack In The Box Security Conference via YouTube

Tags

Hack In The Box Security Conference Courses Cybersecurity Courses Operating Systems Courses Covert Communication Courses

Course Description

Overview

Explore the latest advancements in covert backdoor transmission with this conference talk on Ghost Tunnel 2.0: Blue Ghost. Delve into the innovative use of Bluetooth technology for establishing multiple secure tunnels between client and server simultaneously. Learn how this method enables separate channels for file transfers and command execution while evading tracking and sniffing attempts. Discover the advantages of using Bluetooth traffic, which often bypasses standard protection measures. Examine the implementation of duplex communication using only BLE advertising packets for specific operating systems, eliminating the need for scanning and connecting operations. Gain insights into this highly covert connection method and its potential applications in isolated environments.

Syllabus

#HITBHaxpo D1 - Ghost Tunnel 2.0: Blue Ghost - Yongtao Wang


Taught by

Hack In The Box Security Conference

Related Courses

Introduction to Enterprise Computing
Marist College via Independent
Advanced Operating Systems
Georgia Institute of Technology via Udacity
Programmation sur iPhone et iPad (partie I)
Université Pierre et Marie CURIE via France Université Numerique
操作系统原理(Operating Systems)
Peking University via Coursera
Introduction to Operating Systems
Georgia Institute of Technology via Udacity