Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Operation Escalation - How Commodity Programs Are Evolving Into Advanced Threats

BSidesLV via YouTube

Overview

Explore the evolution of commodity programs into advanced threats in this 53-minute conference talk from BSidesLV 2016. Delve into the concept of "Operation Escalation" as Israel Barak breaks down the intricate details of targeted attacks, legal considerations surrounding Remote Desktop Protocol (RDP), and the ethical implications of cybersecurity research. Gain insights into various tools and techniques used by threat actors, including DP Log Cleaner, RDPPea, and server lists. Examine real-world examples involving institutions like the University of Washington and analyze the impact on credit card processing systems. Investigate command and control structures, RDP processes, and key indicators of compromise. Learn about Mac marketplaces, uptime considerations, and endpoint security in this comprehensive exploration of emerging cyber threats.

Syllabus

Introduction
What is Targeted
Code of Conduct
Is RDP Legal
We Are Not The Owners
Fair Price Trading
Read The Manual
What You Buy
DP Log Cleaner
RDPPea
Server List
US Machines
University of Washington
Phoenix
Credit Card Processing
Washington DC
Fraud
Price Impact
Top 5 States
Command and Control
RDP Processes
Indicators
Mac marketplaces
Uptime
Endpoints

Taught by

BSidesLV

Reviews

Start your review of Operation Escalation - How Commodity Programs Are Evolving Into Advanced Threats

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.