YoVDO

Operation Escalation - How Commodity Programs Are Evolving Into Advanced Threats

Offered By: BSidesLV via YouTube

Tags

Security BSides Courses Cybersecurity Courses Incident Response Courses Market Analysis Courses Fraud Detection Courses Remote Desktop Protocol (RDP) Courses

Course Description

Overview

Explore the evolution of commodity programs into advanced threats in this 53-minute conference talk from BSidesLV 2016. Delve into the concept of "Operation Escalation" as Israel Barak breaks down the intricate details of targeted attacks, legal considerations surrounding Remote Desktop Protocol (RDP), and the ethical implications of cybersecurity research. Gain insights into various tools and techniques used by threat actors, including DP Log Cleaner, RDPPea, and server lists. Examine real-world examples involving institutions like the University of Washington and analyze the impact on credit card processing systems. Investigate command and control structures, RDP processes, and key indicators of compromise. Learn about Mac marketplaces, uptime considerations, and endpoint security in this comprehensive exploration of emerging cyber threats.

Syllabus

Introduction
What is Targeted
Code of Conduct
Is RDP Legal
We Are Not The Owners
Fair Price Trading
Read The Manual
What You Buy
DP Log Cleaner
RDPPea
Server List
US Machines
University of Washington
Phoenix
Credit Card Processing
Washington DC
Fraud
Price Impact
Top 5 States
Command and Control
RDP Processes
Indicators
Mac marketplaces
Uptime
Endpoints


Taught by

BSidesLV

Related Courses

Compute Engine: Qwik Start - Windows
Google via Google Cloud Skills Boost
Configuring and Deploying Windows SQL Server on Google Cloud
Google via Google Cloud Skills Boost
Deploy Microsoft SQL Server to Compute Engine
Google via Google Cloud Skills Boost
Compute Engine: Qwik Start - Windows
Google Cloud via Coursera
Introduction to AWS Database Migration Service (French)
Amazon Web Services via AWS Skill Builder