Overview
Explore the evolution of commodity programs into advanced threats in this 53-minute conference talk from BSidesLV 2016. Delve into the concept of "Operation Escalation" as Israel Barak breaks down the intricate details of targeted attacks, legal considerations surrounding Remote Desktop Protocol (RDP), and the ethical implications of cybersecurity research. Gain insights into various tools and techniques used by threat actors, including DP Log Cleaner, RDPPea, and server lists. Examine real-world examples involving institutions like the University of Washington and analyze the impact on credit card processing systems. Investigate command and control structures, RDP processes, and key indicators of compromise. Learn about Mac marketplaces, uptime considerations, and endpoint security in this comprehensive exploration of emerging cyber threats.
Syllabus
Introduction
What is Targeted
Code of Conduct
Is RDP Legal
We Are Not The Owners
Fair Price Trading
Read The Manual
What You Buy
DP Log Cleaner
RDPPea
Server List
US Machines
University of Washington
Phoenix
Credit Card Processing
Washington DC
Fraud
Price Impact
Top 5 States
Command and Control
RDP Processes
Indicators
Mac marketplaces
Uptime
Endpoints
Taught by
BSidesLV