Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Domain Borrowing - Catch My C2 Traffic if You Can

Black Hat via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a new method for concealing Command and Control (C2) traffic using Content Delivery Networks (CDNs) in this 35-minute Black Hat conference talk. Learn about the limitations of domain fronting and domain hiding techniques, and discover how to circumvent censorship by leveraging CDN workflows. Delve into the concept of Domain Borrowing, including abandoning DNS, abusing CDN domain validation, and obtaining valid HTTPS certificates. Compare Domain Borrowing to other techniques, discuss detection methods and mitigation strategies, and understand how to bypass Palo Alto Firewalls. Gain insights from speakers Tianze Ding and Junyu Zhou on advanced red team tactics for protecting C2 infrastructure.

Syllabus

Intro
Outline
Domain Fronting - Limitations
Domain Hiding - Limitations
What we want for an ideal C2
The HTTPS CDN workflow
Domian Borrowing Basics - Abandon DNS
Abusing CDN domain validation
When CDN can't find the certificate
Borrow arbitrary domain
Obtain valid HTTPS certificates
CDN domain validation bypass
CDN HTTPS certificates distribution
Borrow valid HTTPS certificates
Domain Borrowing vs. Others
Detection
Mitigation
Bypass Palo Alto Firewall

Taught by

Black Hat

Reviews

Start your review of Domain Borrowing - Catch My C2 Traffic if You Can

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.