Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

DEF CON 24 - Brad Woodberg - Malware Command and Control Channels: A journey into darkness

Автор: DEFCONConference

Загружено: 2016-11-13

Просмотров: 7665

Описание:

Much of the time and attention dedicated to modern network security focuses on detecting the contemporary vulnerabilities and exploits which power the breaches that make the headlines. With almost all of the emphasis is placed around the endless cycle of new entry points, we are often overlooking what is perhaps one of the most profoundly interesting aspects of modern network breaches; the post-exploit communication of a compromised system to the attacker—known as command and control.

Once malware has compromised an end system, the tables are turned against the attackers; we go from being on defense, to being on offense. Attackers are constantly evolving their techniques and have become incredibly creative in attempting to hide their tracks, maintain control of compromised systems, and exfiltrate sensitive data. This presentation will explore how command and control channels have evolved against traditional defenses, where they are today, future predictions on their evolution, and most importantly, how you can go on the offense to protect your organization by identifying and disrupting command and control channels in your network.

Bio:
Brad Woodberg is a Group Product Manager at Proofpoint Inc, leading the Emerging Threats product line. Prior to his current role at Proofpoint, he spent six years at Juniper Networks as a layer 7 security product manager and product line engineer. Prior to Juniper he worked for a security consulting company in Ann Arbor Michigan for four years delivering a variety of network security technologies and services. He is a four-time published author of network security books through O’Reilly and Syngress. He has spoken at several security conferences including DEF CON 19, CanSecWest 2011, SEMAPHOR and other regional talks. Brad is also an active mentor to up and coming security engineers who share a similar interest and passion in all things network security.

DEF CON 24 - Brad Woodberg - Malware Command and Control Channels: A journey into darkness

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

DEF CON 32 — Борьба с вредоносным ПО EDR с помощью криминалистики памяти — Кейс, Селлерс, Ричард ...

DEF CON 32 — Борьба с вредоносным ПО EDR с помощью криминалистики памяти — Кейс, Селлерс, Ричард ...

DEF CON 30 - Kyle Avery - Avoiding Memory Scanners - Customizing Malware to Evade YARA, PE-sieve

DEF CON 30 - Kyle Avery - Avoiding Memory Scanners - Customizing Malware to Evade YARA, PE-sieve

DEF CON 32 - Behind Enemy Lines: Going undercover to breach LockBit Ransomware Op- Jon DiMaggio

DEF CON 32 - Behind Enemy Lines: Going undercover to breach LockBit Ransomware Op- Jon DiMaggio

DEF CON 31 - Badge of Shame  Breaking into Secure Facilities with OSDP -Dan Petro, David Vargas

DEF CON 31 - Badge of Shame Breaking into Secure Facilities with OSDP -Dan Petro, David Vargas

BSides DC 2019 - Hands-on Writing Malware in Go

BSides DC 2019 - Hands-on Writing Malware in Go

Путин перестал говорить о войне | Что случилось (English subtitles)

Путин перестал говорить о войне | Что случилось (English subtitles)

Malware Command and Control  - How it Works | Chris Brenton

Malware Command and Control - How it Works | Chris Brenton

Анализ вредоносного ПО с помощью PrnLoader, используемого для удаления Emotet

Анализ вредоносного ПО с помощью PrnLoader, используемого для удаления Emotet

Извлечение прошивки китайской IP-камеры — основы пентестинга в Интернете вещей

Извлечение прошивки китайской IP-камеры — основы пентестинга в Интернете вещей

DEF CON 24 - Grant Bugher - Bypassing Captive Portals and Limited Networks

DEF CON 24 - Grant Bugher - Bypassing Captive Portals and Limited Networks

Хакер демонстрирует самые безумные гаджеты в своем EDC

Хакер демонстрирует самые безумные гаджеты в своем EDC

Infecting the Enterprise: Abusing Office365+Powershell for Covert C2

Infecting the Enterprise: Abusing Office365+Powershell for Covert C2

DEF CON 31 - Infinite Money Glitch - Hacking Transit Cards -  Bertocchi, Campbell, Gibson, Harris

DEF CON 31 - Infinite Money Glitch - Hacking Transit Cards - Bertocchi, Campbell, Gibson, Harris

DEF CON 31 - SpamChannel - Spoofing Emails From 2M+ Domains & Virtually Becoming Satan - byt3bl33d3r

DEF CON 31 - SpamChannel - Spoofing Emails From 2M+ Domains & Virtually Becoming Satan - byt3bl33d3r

Debian: САМЫЙ СТАБИЛЬНЫЙ Linux и ТЁМНАЯ История Создателя

Debian: САМЫЙ СТАБИЛЬНЫЙ Linux и ТЁМНАЯ История Создателя

Black Hat USA 2013 - Lessons from Surviving a 300Gbps Denial of Service Attack

Black Hat USA 2013 - Lessons from Surviving a 300Gbps Denial of Service Attack

Mobile Espionage in the Wild: Pegasus and Nation-State Level Attacks

Mobile Espionage in the Wild: Pegasus and Nation-State Level Attacks

DEF CON 30 - Tomer Bar - OopsSec -The bad, the worst and the ugly of APT’s operations security

DEF CON 30 - Tomer Bar - OopsSec -The bad, the worst and the ugly of APT’s operations security

DEF CON 17 - Matt Weir - Cracking 400000 Passwords

DEF CON 17 - Matt Weir - Cracking 400000 Passwords

DLL Sideloading

DLL Sideloading

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: infodtube@gmail.com