際際滷shows by User: MarkSecretario / http://www.slideshare.net/images/logo.gif 際際滷shows by User: MarkSecretario / Wed, 14 Oct 2020 05:39:58 GMT 際際滷Share feed for 際際滷shows by User: MarkSecretario Pursuing evasive custom command & control - GuideM /slideshow/pursuing-evasive-custom-command-control-guidem/238864456 pursuingevasivecustomcommandcontrol-guidem-201014053958
This talk is all about dissecting C3 channels and how the attacker leverages this technique in order to exfiltrate data using cloud storage provider - Investigating in-memory attacks leveraging legitimate 3rd party services like Dropbox, OneDrive, and Slack to use as a medium for Command & Control Communication - Detecting usage and exfiltration optimizing custom command & control channels]]>

This talk is all about dissecting C3 channels and how the attacker leverages this technique in order to exfiltrate data using cloud storage provider - Investigating in-memory attacks leveraging legitimate 3rd party services like Dropbox, OneDrive, and Slack to use as a medium for Command & Control Communication - Detecting usage and exfiltration optimizing custom command & control channels]]>
Wed, 14 Oct 2020 05:39:58 GMT /slideshow/pursuing-evasive-custom-command-control-guidem/238864456 MarkSecretario@slideshare.net(MarkSecretario) Pursuing evasive custom command & control - GuideM MarkSecretario This talk is all about dissecting C3 channels and how the attacker leverages this technique in order to exfiltrate data using cloud storage provider - Investigating in-memory attacks leveraging legitimate 3rd party services like Dropbox, OneDrive, and Slack to use as a medium for Command & Control Communication - Detecting usage and exfiltration optimizing custom command & control channels <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/pursuingevasivecustomcommandcontrol-guidem-201014053958-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This talk is all about dissecting C3 channels and how the attacker leverages this technique in order to exfiltrate data using cloud storage provider - Investigating in-memory attacks leveraging legitimate 3rd party services like Dropbox, OneDrive, and Slack to use as a medium for Command &amp; Control Communication - Detecting usage and exfiltration optimizing custom command &amp; control channels
Pursuing evasive custom command & control - GuideM from Mark Secretario
]]>
470 0 https://cdn.slidesharecdn.com/ss_thumbnails/pursuingevasivecustomcommandcontrol-guidem-201014053958-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-MarkSecretario-48x48.jpg?cb=1719185132