Главная
Study mode:
on
1
Introduction
2
Phases of a cyber attack
3
The smart guys
4
Behavior
5
Encryption
6
Do you decrypt network traffic
7
Behavior patterns
8
Hip messages
9
Demo
10
HTTP
11
Survey Report
12
Zombie Guts
13
Use Cases
14
Identifying Behavior
15
Pulling Instructions
16
What poses the greatest risk
17
Game of Thrones
18
Remote Access
19
GlassRat
20
Breaking Bad
21
Common Techniques
22
NonHuman Devices
23
Summary
Description:
Explore the intricacies of covert communications in modern cyber attacks through this 40-minute conference talk from Louisville InfoSec 2016. Delve into the various phases of cyber attacks, examining the tactics employed by sophisticated threat actors. Learn about behavior patterns, encryption methods, and the challenges of decrypting network traffic. Discover how attackers use innovative techniques like "hip messages" and unconventional protocols to evade detection. Analyze real-world use cases, including the identification of malicious behavior and the extraction of attacker instructions. Investigate the risks posed by remote access tools, malware like GlassRat, and non-human devices. Gain valuable insights into common techniques used by cybercriminals and develop a deeper understanding of the evolving landscape of cyber threats.

The Use of Covert Communications in Modern Cyber Attacks

Add to list