Completed
Threat Model
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
ShadowMove - A Stealthy Lateral Movement Strategy
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Advanced Persistent Threats (APTs) are Extremely Harmful
- 3 Existing Lateral Movement Technique
- 4 ShadowMove: a Novel Attack Technique
- 5 Case Study: Single Hop ShadowMove Over FTP
- 6 ShadowMove among Network Nodes
- 7 Threat Model
- 8 ShadowMove Architecture
- 9 Connection Detector
- 10 Conventional Socket Duplication
- 11 ShadowMove Socket Duplicator
- 12 Peer Handler
- 13 Lateral Movement Planner
- 14 Lateral Movement Plan Actuator
- 15 ShadowMove Implementation
- 16 ShadowMove PoC Leveraging WinRM (Windows Remote Management)
- 17 Evaluation of the Stealthiness
- 18 Limitations of the Current ShadowMove Prototype
- 19 Acknowledgement