Главная
Study mode:
on
1
Intro
2
About Bart
3
Controversy
4
Pulse Secure
5
Traditional Incident Response
6
Integrity Tool
7
Cluster Overview
8
Upgrade Script
9
Slow Pulse
10
Cluster 2717
11
Pulse Jump
12
Antiforensics
13
Forensics
14
Exit nodes
15
Credential reuse
16
Summary
17
Bottom Line
Description:
Explore the rise of VPN exploits in the era of remote work in this 25-minute Black Hat conference talk. Delve into the vulnerabilities of Pulse Secure VPN devices, a leading technology often deployed at the intersection of trusted and untrusted networks. Examine how threat actors, including suspected Chinese-nexus groups, have exploited these vulnerabilities for cyber espionage. Learn about traditional incident response methods, integrity tools, and cluster analysis techniques used to combat these threats. Investigate antiforensics tactics employed by attackers and discover forensic approaches to counter them. Gain insights into credential reuse and exit node strategies utilized in these attacks. Conclude with a comprehensive summary and key takeaways on securing VPN technologies in the evolving landscape of remote work.

APTs Go Teleworking - The Rise of VPN Exploits

Black Hat
Add to list
0:00 / 0:00