Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

The Use of Covert Communications in Modern Cyber Attacks

via YouTube

Overview

Explore the intricacies of covert communications in modern cyber attacks through this 40-minute conference talk from Louisville InfoSec 2016. Delve into the various phases of cyber attacks, examining the tactics employed by sophisticated threat actors. Learn about behavior patterns, encryption methods, and the challenges of decrypting network traffic. Discover how attackers use innovative techniques like "hip messages" and unconventional protocols to evade detection. Analyze real-world use cases, including the identification of malicious behavior and the extraction of attacker instructions. Investigate the risks posed by remote access tools, malware like GlassRat, and non-human devices. Gain valuable insights into common techniques used by cybercriminals and develop a deeper understanding of the evolving landscape of cyber threats.

Syllabus

Introduction
Phases of a cyber attack
The smart guys
Behavior
Encryption
Do you decrypt network traffic
Behavior patterns
Hip messages
Demo
HTTP
Survey Report
Zombie Guts
Use Cases
Identifying Behavior
Pulling Instructions
What poses the greatest risk
Game of Thrones
Remote Access
GlassRat
Breaking Bad
Common Techniques
NonHuman Devices
Summary

Reviews

Start your review of The Use of Covert Communications in Modern Cyber Attacks

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.