Overview
Syllabus
Intro
Advanced Persistent Threats (APTs) are Extremely Harmful
Existing Lateral Movement Technique
ShadowMove: a Novel Attack Technique
Case Study: Single Hop ShadowMove Over FTP
ShadowMove among Network Nodes
Threat Model
ShadowMove Architecture
Connection Detector
Conventional Socket Duplication
ShadowMove Socket Duplicator
Peer Handler
Lateral Movement Planner
Lateral Movement Plan Actuator
ShadowMove Implementation
ShadowMove PoC Leveraging WinRM (Windows Remote Management)
Evaluation of the Stealthiness
Limitations of the Current ShadowMove Prototype
Acknowledgement
Taught by
CAE in Cybersecurity Community