How to Protect Yourself from Reverse Shells [ThreatLocker Webinar]

Описание к видео How to Protect Yourself from Reverse Shells [ThreatLocker Webinar]

This is how hackers are getting FULL CONTROL of your devices! 🖥️


Danny Jenkins, Rob Allen, and Ivan Fonseca of ThreatLocker expose yet another vector of attack in cybercrime! Watch the trio break down how hackers initiate reverse shell attacks via executable-based malware and an OMG Cable!

About:
ThreatLocker® is a Zero Trust Endpoint Protection Platform that provides enterprise-level cybersecurity to organizations globally. With ThreatLocker, you can allow only what you need and block everything else, including ransomware!

For More on ThreatLocker®:

Website:
https://threatlocker.com/?utm_source=...

Get $200 off your Zero Trust World when you register with code WEBSHELL (Offer valid through January 31, 2024):
https://zerotrustworld.threatlocker.c...

Book a FREE Demo:
https://www.threatlocker.com/book-a-t...

Facebook:   / thethreatlocker  
LinkedIn:   / threatlockerinc  
Twitter:   / threatlocker  
Instagram:   / threatlocker  
YouTube:    / threatlocker  

Chapters:
00:00 - Introduction
02:15 - Webinar breakdown
09:09 - Reverse Shell with File-Based (self-deleting) Malware
15:16 - Q) "Will this be picked up by a SOC that is monitoring the system's EDR?"
18:01 - Q) "Are you giving bad guys tips on how not to get detected? Aren't you the good guys?"
20:30 - Q) "Does this reverse shell sustain a reboot?"
20:43 - OMG Cable Reverse Shell to a Living Off the Land (LOTL) Attack
26:12 - How ThreatLocker would have blocked the reverse shell(s)
28:05 - Q) "How does ThreatLocker stop fileless attacks?"
28:16 - Q) "How does [ThreatLocker] distinguish between trusted and untrusted executables?"
29:58 - Q) "What happens when the executable's hash changes due to updates?"
31:22 - Q) "Are these OMG Cables local-only hacks over WiFi or do they exist in internet form also?"
33:02 - Q) "Would the hash still update if the application is permitted through an application group as well or only matched applications?"
33:32 - Q) "What interface does OMG Cables/Rubber Duckies appear as in the Application Control policy in ThreatLocker?"
34:04 - Q) "Can it be used on the internet?"
34:59 - Q) "Does ThreatLocker block fileless malware?"
35:29 - Q) "What are the capabilities of OMG Cables compromising mobile devices? How do I protect them?"
36:20 - Q) "Has ThreatLocker ever been beaten by high-memory exploits?"
40:13 - Network Controls and Port 3389
42:33 - See it all in person at Zero Trust World!
44:10 - Outro

©2023 ThreatLocker Inc., All Rights Reserved.

Комментарии

Информация по комментариям в разработке