Главная
Study mode:
on
1
Introduction
2
Firewall
3
Logo
4
What is the sneaky creeper
5
Testing
6
Demo
7
In the wild
8
Feedback
9
What modules do you want
10
Github
11
Twitter
12
Textsecure
13
Defenses
14
Multichannel capability
15
Message size limits
16
Exfil
17
checksum
Description:
Learn about data exfiltration techniques using social media platforms in this 21-minute conference talk from BSidesLV 2015. Explore the concept of the "sneaky creeper" and its implications for cybersecurity. Discover various modules and tools used for data extraction, including Github, Twitter, and Textsecure. Examine defensive strategies, multichannel capabilities, and message size limits. Gain insights into exfil checksum methods and understand the potential risks associated with social media-based data exfiltration.

Getting the Data Out Using Social Media

Add to list
0:00 / 0:00