Explore the weaponization of esoteric internal command and control (C2) channels for lateral movement in this 38-minute Black Hat conference talk. Discover novel and reimagined techniques for breaking out of heavily segregated environments as presented by James Coote, an attack simulation consultant with F-Secure Consulting. Gain insights into innovative methods for bypassing network segregation and learn about cutting-edge approaches to internal C2 channels. Delve into the intricacies of advanced lateral movement strategies and understand their potential impact on network security.
Overview
Syllabus
Breaking Network Segregation Using Esoteric Command & Control Channels
Taught by
Black Hat