99 Reasons Your Perimeter Is Leaking - Evolution of CC

99 Reasons Your Perimeter Is Leaking - Evolution of CC

via YouTube Direct link

Other Protocol Tunneling?

10 of 41

10 of 41

Other Protocol Tunneling?

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

99 Reasons Your Perimeter Is Leaking - Evolution of CC

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Hi, I'm John
  3. 3 Command and Control
  4. 4 Capability
  5. 5 A Brief History of C2
  6. 6 Capabilities Bind Shell - Reverse Shell
  7. 7 Constraints Reverse Shell
  8. 8 Capabilities Shells - IRC
  9. 9 Constraints IRC Channels
  10. 10 Other Protocol Tunneling?
  11. 11 DNS Tunneling
  12. 12 Domain Fronting
  13. 13 Apps / 3rd Party Services
  14. 14 Increasing Red Team Capabilities
  15. 15 Needs - Reliability
  16. 16 Needs - Concealment
  17. 17 Needs - Resilience • Expect messages to be lost, and still operate
  18. 18 Design Decisions
  19. 19 Hyperwave Architecture
  20. 20 Example 1 - Transitivity
  21. 21 Example 2 - Redundancy
  22. 22 Red Team Operational Concerns
  23. 23 C&C Detection Fundamentals
  24. 24 Control Your Attack Surface
  25. 25 Into the App Layer
  26. 26 Ways To Detect...
  27. 27 Unused Services
  28. 28 Process-Traffic Correlation
  29. 29 Unique Domain Activity
  30. 30 Unique URL Path/Params
  31. 31 Headers
  32. 32 Authentication Artifacts
  33. 33 Behavior - API Usage
  34. 34 Behavior - Timing . Our transport polls at X seconds
  35. 35 Payload Patterns
  36. 36 10. General Behavior
  37. 37 Detecting Abuse of: Dropbox
  38. 38 Blue Team Questions
  39. 39 Unit Testing
  40. 40 PC2
  41. 41 Questions?

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.