Главная
Study mode:
on
1
Introduction
2
Why Trust Dan
3
Agenda
4
Disclaimer
5
Cloud Sync
6
Dropbox
7
Case Study
8
Standard Methods
9
Physical Security
10
Spam
11
Plan B
12
Sweet Brown Interview
13
Where are we
14
Right this time
15
What company was it
16
What we need
17
DropSmack
18
How does it work
19
Long term use
20
Commands
21
Deploy
22
Social Engineering
23
Exfiltration
24
Sleep
25
Detect
26
Nextgen firewalls
27
Lansing protocol
28
Better detection strategies
29
Demo
30
Survey Command
31
Cloud Password
32
Future Work
Description:
Explore a comprehensive analysis of how cloud synchronization services can compromise corporate network security in this Black Hat Europe 2013 conference talk. Delve into the potential risks associated with cloud backup solutions like Dropbox, examining their ability to bypass Data Loss Prevention (DLP) systems and corporate firewalls. Learn about a real-world case study demonstrating how these services can be exploited as malware delivery vectors and command and control channels. Discover the functioning malware tool "DropSmack," designed to leverage Dropbox for data exfiltration. Gain insights into the implications of cloud sync services in corporate environments, detection strategies, and potential security controls. Watch a live demonstration of the tool in action and consider the broader implications for network security in the age of cloud synchronization.

DropSmack - How Cloud Sync Services Render Your Corporate Firewall Worthless

Black Hat
Add to list
0:00 / 0:00