Главная
Study mode:
on
1
Intro
2
Who am I
3
Honey I Stole
4
Typical Mandiant investigation
5
We say goodbye
6
Weird service installs
7
Metasploit indicators
8
Metasploit investigation
9
Initial attack vector
10
Command and control
11
Encoding
12
Free Domain Tools
13
Windows Server
14
Linux ISO
15
Linux VM
16
PostgreSQL
17
VMDK
18
Change password
19
MSF console
20
Bypass metasploit
21
Medical credentials
22
Postcrash tables
23
Previous database drops
24
Postgres sequel
25
Postgres parser
26
Postgres header
27
Rows
28
Parser
29
Attacker Insights
30
Any questions
Description:
Dive into a 31-minute conference talk exploring attacker infrastructure and investigative techniques. Learn about typical Mandiant investigations, unusual service installations, Metasploit indicators, and initial attack vectors. Discover insights on command and control, encoding methods, and free domain tools. Explore Windows Server and Linux environments, including ISO and VM setups. Gain knowledge about PostgreSQL databases, including password changes, MSF console usage, and bypassing Metasploit. Examine medical credentials, postcrash tables, and database drops. Analyze Postgres sequels, parsers, and headers to gain valuable attacker insights. Conclude with a Q&A session to deepen understanding of cybersecurity investigation methods.

Honey I Stole Your C2 Server - A Dive into Attacker Infrastructure

Add to list
0:00 / 0:00