Learn about data exfiltration techniques using social media platforms in this 21-minute conference talk from BSidesLV 2015. Explore the concept of the "sneaky creeper" and its implications for cybersecurity. Discover various modules and tools used for data extraction, including Github, Twitter, and Textsecure. Examine defensive strategies, multichannel capabilities, and message size limits. Gain insights into exfil checksum methods and understand the potential risks associated with social media-based data exfiltration.
Overview
Syllabus
Introduction
Firewall
Logo
What is the sneaky creeper
Testing
Demo
In the wild
Feedback
What modules do you want
Github
Twitter
Textsecure
Defenses
Multichannel capability
Message size limits
Exfil
checksum