YoVDO

ShadowMove - A Stealthy Lateral Movement Strategy

Offered By: CAE in Cybersecurity Community via YouTube

Tags

Advanced Persistent Threats Courses Cybersecurity Courses

Course Description

Overview

Explore a novel attack technique called ShadowMove in this 51-minute conference talk by Associate Professor Jinpeng Wei from the University of North Carolina at Charlotte. Delve into the world of Advanced Persistent Threats (APTs) and learn how ShadowMove operates as a stealthy lateral movement strategy. Examine the threat model, architecture, and implementation of ShadowMove, including its components such as the Connection Detector, Socket Duplicator, Peer Handler, and Lateral Movement Planner. Analyze a case study of single-hop ShadowMove over FTP and understand how it moves among network nodes. Evaluate the stealthiness of this technique and discuss its current limitations. Gain insights into cybersecurity challenges and potential countermeasures against sophisticated attack strategies.

Syllabus

Intro
Advanced Persistent Threats (APTs) are Extremely Harmful
Existing Lateral Movement Technique
ShadowMove: a Novel Attack Technique
Case Study: Single Hop ShadowMove Over FTP
ShadowMove among Network Nodes
Threat Model
ShadowMove Architecture
Connection Detector
Conventional Socket Duplication
ShadowMove Socket Duplicator
Peer Handler
Lateral Movement Planner
Lateral Movement Plan Actuator
ShadowMove Implementation
ShadowMove PoC Leveraging WinRM (Windows Remote Management)
Evaluation of the Stealthiness
Limitations of the Current ShadowMove Prototype
Acknowledgement


Taught by

CAE in Cybersecurity Community

Related Courses

Security Principles
(ISC)² via Coursera
A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera
FinTech for Finance and Business Leaders
ACCA via edX
Access Control Concepts
(ISC)² via Coursera
Access Controls
(ISC)² via Coursera