ShadowMove - A Stealthy Lateral Movement Strategy

ShadowMove - A Stealthy Lateral Movement Strategy

CAE in Cybersecurity Community via YouTube Direct link

Existing Lateral Movement Technique

3 of 19

3 of 19

Existing Lateral Movement Technique

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

ShadowMove - A Stealthy Lateral Movement Strategy

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Advanced Persistent Threats (APTs) are Extremely Harmful
  3. 3 Existing Lateral Movement Technique
  4. 4 ShadowMove: a Novel Attack Technique
  5. 5 Case Study: Single Hop ShadowMove Over FTP
  6. 6 ShadowMove among Network Nodes
  7. 7 Threat Model
  8. 8 ShadowMove Architecture
  9. 9 Connection Detector
  10. 10 Conventional Socket Duplication
  11. 11 ShadowMove Socket Duplicator
  12. 12 Peer Handler
  13. 13 Lateral Movement Planner
  14. 14 Lateral Movement Plan Actuator
  15. 15 ShadowMove Implementation
  16. 16 ShadowMove PoC Leveraging WinRM (Windows Remote Management)
  17. 17 Evaluation of the Stealthiness
  18. 18 Limitations of the Current ShadowMove Prototype
  19. 19 Acknowledgement

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.