The Use of Covert Communications in Modern Cyber Attacks
Offered By: YouTube
Course Description
Overview
Explore the intricacies of covert communications in modern cyber attacks through this 40-minute conference talk from Louisville InfoSec 2016. Delve into the various phases of cyber attacks, examining the tactics employed by sophisticated threat actors. Learn about behavior patterns, encryption methods, and the challenges of decrypting network traffic. Discover how attackers use innovative techniques like "hip messages" and unconventional protocols to evade detection. Analyze real-world use cases, including the identification of malicious behavior and the extraction of attacker instructions. Investigate the risks posed by remote access tools, malware like GlassRat, and non-human devices. Gain valuable insights into common techniques used by cybercriminals and develop a deeper understanding of the evolving landscape of cyber threats.
Syllabus
Introduction
Phases of a cyber attack
The smart guys
Behavior
Encryption
Do you decrypt network traffic
Behavior patterns
Hip messages
Demo
HTTP
Survey Report
Zombie Guts
Use Cases
Identifying Behavior
Pulling Instructions
What poses the greatest risk
Game of Thrones
Remote Access
GlassRat
Breaking Bad
Common Techniques
NonHuman Devices
Summary
Related Courses
Internet History, Technology, and SecurityUniversity of Michigan via Coursera Sicherheit im Internet
openHPI أساسيات التشفير
Rwaq (رواق) Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera Web Application Development: Security
University of New Mexico via Coursera