YoVDO

Circumventing the Guardians - How the Security Features in State-of-the-Art TLS Inspection Solutions Can Be Exploited for Covert Data Exfiltration

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Network Administration Courses Command and Control Courses Data Exfiltration Courses

Course Description

Overview

Explore a new stealthy method of data exfiltration that bypasses security solutions designed to detect such attacks in this 26-minute Black Hat conference talk. Delve into the SNIcat exfiltration technique, which circumvents security perimeter solutions performing TLS inspection. Learn about TLS inspection devices, simple TLS handshakes, command and control structures, agent functionality, traffic capture methods, and core operational aspects of this technique. Examine potential mitigation and detection strategies, and witness a practical demonstration of the Sneakout tool in action. Gain valuable insights into advanced cybersecurity threats and defensive measures from speakers Matteo Malvica and Morten Marstrander.

Syllabus

Introduction
Who am I
Agenda
Background
Snicket
TLS Inspection Devices
Simple TLS handshake
Whats next
Command and Control
Agent and C2
Traffic Capture
Core Functionality
Mitigation Detection
Conclusion
Sneakout
Demo Environment
Demo Client
Outro


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube