Presented at
BSides Austin 2018,
March 8, 2018, 2:30 p.m.
(60 minutes).
The information security landscape is changing. More organizations are taking the right steps to detect attackers operating against their network environments. This is why penetration testers need to start leveraging tactics and techniques that further obfuscate their operations in order to provide a robust and realistic attack simulation.
Cloud infrastructure has introduced unique solutions to new problems that have arisen with the issue content delivery. These very same solutions can be repurposed and leveraged to create a robust and resilient attack infrastructure which will give blue teams a very hard time. Techniques to be covered will include, but not limited to, domain fronting, managing c2 infrastructure, and obfuscating traffic ranging from scanning to web application attacks.
Presenters:
-
Mike Hodges
- Senior Consultant - Optiv
Mike Hodges is a senior consultant for the Optiv Attack and Penetration Practice. He has a background in application development and is currently OSCP, Assoc CISSP, and CEH certified. He is currently interested in evasive penetration tactics and techniques and is constantly looking to build new ways to automate attacker evasion.
Links:
Similar Presentations: