The Future of Data Exfiltration and Malicious Communication
Offered By: WEareTROOPERS via YouTube
Course Description
Overview
Explore a conference talk on advanced data exfiltration techniques and malicious communication methods. Delve into covert channels, protocol channels, and protocol hopping covert channels. Learn about shared resource matrices, covert flow trees, and traffic normalization. Discover micro protocol engineering approaches and status update techniques. Examine packet forwarding examples and requirements for covert channel routing. Investigate agents and drones for overlay routing. Gain insights into BACnet protection and the implementation of multi-level security using an open-source BACnet firewall router. Access related publications to further expand your knowledge on these cutting-edge cybersecurity topics.
Syllabus
Intro
Typical Techniques for Covert Channels
Shared Resource Matrix
Covert Flow Trees
Traffic Normalization
Other Approaches
Summary (pt. 1)
Protocol Channels & Protocol Hopping Covert Channels
Terminology
Combining Multiple Layers
Micro Prot. Engineering Approach
Status Update Approach
Example: Packet Forwarding
Requirements for CC Routing
Agents and Drones for Overlay Routing
Summary (pt. 2)
BACnet Protection
Introducing MLS using the Open Source BACnet Firewall Router
Summary (pt. 3)
Related Publications
Taught by
WEareTROOPERS
Related Courses
Modmob Tools - Home Made Tools to Test Mobile Devices and Monitor NetworksWEareTROOPERS via YouTube Microsoft IT - Secure Journey to IPv6-Only
WEareTROOPERS via YouTube Introducing Faction - A Modern, Powerful, Multiplayer C2 Framework
WEareTROOPERS via YouTube A Diet of Poisoned Fruit - Designing Implants and OT Payloads for ICS Embedded Devices
WEareTROOPERS via YouTube Hardware Side Channel Attacks on the Cheapest
WEareTROOPERS via YouTube