Counterfeiting the Pipes with FakeNet 2.0

Counterfeiting the Pipes with FakeNet 2.0

Black Hat via YouTube Direct link

Introduction

1 of 36

1 of 36

Introduction

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Counterfeiting the Pipes with FakeNet 2.0

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Practical Matter Analysis
  3. 3 Outline
  4. 4 Background Malware
  5. 5 Protocols
  6. 6 Infrastructure
  7. 7 Beaconing
  8. 8 Why Fake the Network
  9. 9 Existing Tools
  10. 10 Fake DNS
  11. 11 Fake DNS GUI
  12. 12 Netcat
  13. 13 Inetsim
  14. 14 FakeNet
  15. 15 Goals
  16. 16 Usage
  17. 17 Downloading Files
  18. 18 Downloading Programs
  19. 19 Layered Service Providers
  20. 20 How Does It Work
  21. 21 Listeners
  22. 22 WSP dll
  23. 23 Packet Capture
  24. 24 Output Options
  25. 25 Python
  26. 26 Fame
  27. 27 New Features
  28. 28 Process Logging
  29. 29 Bug Breakpoint
  30. 30 Demo EXE
  31. 31 Stop DNS Service
  32. 32 Post Response
  33. 33 IP Address
  34. 34 Additional Changes
  35. 35 Whats Next
  36. 36 Lunch

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.