Ghost Tunnel 2.0 - Blue Ghost
Offered By: Hack In The Box Security Conference via YouTube
Course Description
Overview
Explore the latest advancements in covert backdoor transmission with this conference talk on Ghost Tunnel 2.0: Blue Ghost. Delve into the innovative use of Bluetooth technology for establishing multiple secure tunnels between client and server simultaneously. Learn how this method enables separate channels for file transfers and command execution while evading tracking and sniffing attempts. Discover the advantages of using Bluetooth traffic, which often bypasses standard protection measures. Examine the implementation of duplex communication using only BLE advertising packets for specific operating systems, eliminating the need for scanning and connecting operations. Gain insights into this highly covert connection method and its potential applications in isolated environments.
Syllabus
#HITBHaxpo D1 - Ghost Tunnel 2.0: Blue Ghost - Yongtao Wang
Taught by
Hack In The Box Security Conference
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network