The Future of Data Exfiltration and Malicious Communication
Offered By: WEareTROOPERS via YouTube
Course Description
Overview
Explore a conference talk on advanced data exfiltration techniques and malicious communication methods. Delve into covert channels, protocol channels, and protocol hopping covert channels. Learn about shared resource matrices, covert flow trees, and traffic normalization. Discover micro protocol engineering approaches and status update techniques. Examine packet forwarding examples and requirements for covert channel routing. Investigate agents and drones for overlay routing. Gain insights into BACnet protection and the implementation of multi-level security using an open-source BACnet firewall router. Access related publications to further expand your knowledge on these cutting-edge cybersecurity topics.
Syllabus
Intro
Typical Techniques for Covert Channels
Shared Resource Matrix
Covert Flow Trees
Traffic Normalization
Other Approaches
Summary (pt. 1)
Protocol Channels & Protocol Hopping Covert Channels
Terminology
Combining Multiple Layers
Micro Prot. Engineering Approach
Status Update Approach
Example: Packet Forwarding
Requirements for CC Routing
Agents and Drones for Overlay Routing
Summary (pt. 2)
BACnet Protection
Introducing MLS using the Open Source BACnet Firewall Router
Summary (pt. 3)
Related Publications
Taught by
WEareTROOPERS
Related Courses
Python 3 For Offensive PenTest: A Complete Practical CourseUdemy Python for Command-and-control, Exfiltration and Impact
Infosec via Coursera Network Analysis with Arkime
Pluralsight Cisco Core Security: Secure Network Access, Visibility, and Enforcement
Pluralsight Post Exploitation with Meterpreter
Pluralsight