The Use of Covert Communications in Modern Cyber Attacks
Offered By: YouTube
Course Description
Overview
Explore the intricacies of covert communications in modern cyber attacks through this 40-minute conference talk from Louisville InfoSec 2016. Delve into the various phases of cyber attacks, examining the tactics employed by sophisticated threat actors. Learn about behavior patterns, encryption methods, and the challenges of decrypting network traffic. Discover how attackers use innovative techniques like "hip messages" and unconventional protocols to evade detection. Analyze real-world use cases, including the identification of malicious behavior and the extraction of attacker instructions. Investigate the risks posed by remote access tools, malware like GlassRat, and non-human devices. Gain valuable insights into common techniques used by cybercriminals and develop a deeper understanding of the evolving landscape of cyber threats.
Syllabus
Introduction
Phases of a cyber attack
The smart guys
Behavior
Encryption
Do you decrypt network traffic
Behavior patterns
Hip messages
Demo
HTTP
Survey Report
Zombie Guts
Use Cases
Identifying Behavior
Pulling Instructions
What poses the greatest risk
Game of Thrones
Remote Access
GlassRat
Breaking Bad
Common Techniques
NonHuman Devices
Summary
Related Courses
Building Geospatial Apps on Postgres, PostGIS, & Citus at Large ScaleMicrosoft via YouTube Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube What's New in Grails 2.0
ChariotSolutions via YouTube Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube