Главная
Study mode:
on
1
Introduction
2
Agenda
3
Timeline
4
DNS Tunneling
5
DNS Over HTTPS
6
NetworkBased Ideas
7
HostBased Ideas
8
SIM
9
Cloud services
10
Preparation
11
How it establishes
12
Three possible outcomes
13
AWS GuardDuty
14
What do we need
15
Embed the access key
16
Set up the C server
17
Attackers S3 Bucket
18
Common Flaws
Description:
Explore advanced covert communication techniques for malware in this Hack In The Box Security Conference talk. Delve into the evolution of DNS tunneling and its detection by Network Intrusion Detection Systems (NIDS). Learn how malware can maintain stealthy communication channels by leveraging cloud services and Content Delivery Networks (CDNs). Discover a robust Command and Control (C&C) method using attacker-owned S3 buckets to evade AWS GuardDuty detection. Examine various AWS services that can be exploited for covert C&C and data exfiltration. Gain insights into mitigation strategies and common pitfalls to avoid when using public cloud services like AWS. Benefit from the speaker's extensive programming background and previous conference experiences to understand cutting-edge cybersecurity threats and defenses.

AWS GuardDuty - Post-DNS Era Covert Channel For C&C

Hack In The Box Security Conference
Add to list