YoVDO

The Future of Data Exfiltration and Malicious Communication

Offered By: WEareTROOPERS via YouTube

Tags

TROOPERS Courses Data Exfiltration Courses

Course Description

Overview

Explore a conference talk on advanced data exfiltration techniques and malicious communication methods. Delve into covert channels, protocol channels, and protocol hopping covert channels. Learn about shared resource matrices, covert flow trees, and traffic normalization. Discover micro protocol engineering approaches and status update techniques. Examine packet forwarding examples and requirements for covert channel routing. Investigate agents and drones for overlay routing. Gain insights into BACnet protection and the implementation of multi-level security using an open-source BACnet firewall router. Access related publications to further expand your knowledge on these cutting-edge cybersecurity topics.

Syllabus

Intro
Typical Techniques for Covert Channels
Shared Resource Matrix
Covert Flow Trees
Traffic Normalization
Other Approaches
Summary (pt. 1)
Protocol Channels & Protocol Hopping Covert Channels
Terminology
Combining Multiple Layers
Micro Prot. Engineering Approach
Status Update Approach
Example: Packet Forwarding
Requirements for CC Routing
Agents and Drones for Overlay Routing
Summary (pt. 2)
BACnet Protection
Introducing MLS using the Open Source BACnet Firewall Router
Summary (pt. 3)
Related Publications


Taught by

WEareTROOPERS

Related Courses

Python 3 For Offensive PenTest: A Complete Practical Course
Udemy
Python for Command-and-control, Exfiltration and Impact
Infosec via Coursera
Network Analysis with Arkime
Pluralsight
Cisco Core Security: Secure Network Access, Visibility, and Enforcement
Pluralsight
Post Exploitation with Meterpreter
Pluralsight