Description: A vulnerability exists through Social Networking Sites that allows the exfiltration and infiltration of data and C2 messages on secured networks. SNSCat provides a simple to use post-penetration data exfiltration/infiltration and C2 platform using images and documents on social media sites (Facebook, Google Apps, twitter, imgur, etc). The first part of our presentation will focus on case studies the risk assumed through allowing social media sites on business networks both by malicious insiders and outsiders. After coverage of preliminary terms and concepts, we will introduce our tool and show how one can easily move files in and out of a network using social media sites. Finally, we will introduce how one can plug in their own home-brewed steganography and cryptology modules as well as how one can build connectors for additional sites into our framework. In short, this presentation will show you how to bypass network security devices via social networking sites and mask data infiltration/exfiltration and mask data infiltration/exfiltration and C2 from any network with access to social networking sites.
Dan, Solomon & Scott are digital security enthusiasts skilled in the art of steganography, cryptography and covert channels. All three have spent time preventing, detecting and responding to threats on large enterprise networks and are firm believers that sometimes code speaks much louder than words when dealing with management.
Tags: securitytube , shmoocon , shmoo con , hacking , hackers , information security , convention , computer security , shmoo 12 , shmoocon 12 , shmoocon-2012 ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.