Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Unparalleled RDP Monitoring to Reveal Attackers' Tradecraft

DEFCONConference via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Watch a DEF CON 31 conference talk exploring Remote Desktop Protocol (RDP) attack patterns through an innovative Dungeons & Dragons analogy. Dive into findings from over 100 hours of intercepted attacker footage captured using PyRDP, an open-source monitoring tool. Learn how threat actors are categorized into distinct archetypes - from Bards conducting suspicious searches to Wizards using RDP as cloaking portals. Examine real video evidence of attackers' techniques, tools, and behaviors, including XDedic RDP patch, NLBrute, Masscan GUI, and methods for disabling Windows Defender. Gain valuable insights from a unique partnership between an engineer and crime data scientist as they demonstrate how RDP interception capabilities can benefit security research and blue teams in identifying and focusing on sophisticated threats. Understand the tradecraft of opportunistic attackers through extensive documentation and analysis of their methodologies.

Syllabus

Intro
DISCLAIMER: DUNGEONS AND DRAGONS NERDINESS
THE QUEST (AGENDA)
PYRDP: TOOL CHARACTERISTICS
THE PYRDP CRYSTAL BALL
RANGER IN ACTION
BARBARIAN IN ACTION
WIZARD IN ACTION
XDEDIC RDP PATCH
NLBRUTE
MASSCAN GUI
WINDOWS DEFENDER REMOVE SCRIPT
DCONTROL (AKA DEFENDER CONTROL)
GAMMADYNE MAILER
OUR TOOL IS GREAT FOR INTEL
THE PARTY
TAKEAWAYS

Taught by

DEFCONConference

Reviews

Start your review of Unparalleled RDP Monitoring to Reveal Attackers' Tradecraft

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.