Hiding your activity on a network without tripping any alarms can be complicated in highly protected environments. In this presentation, I’ll demonstrate some practical methods to communicate on a network without alerting defenders or disclosing information about your activity—even when you’re operating on a network that makes use of deep packet inspection.
We’ll go through 2 working examples of mimicking traffic and talk about the potential of Format Transforming Encryption.
What is A2Maldev?
When you’re working in computer security, it’s extremely important to consider both offensive and defensive techniques. This meetup is dedicated to thinking like a malicious software developer. We’ll discuss techniques used in the wild as well as potential future methods for exploiting and controlling systems. The purpose of this meetup is to educate people who are interested in computer security about what types of threats are possible. Any and all technical information given in this meetup is for education and research purposes only. We do not condone crime of any kind.
AHA! (All Hands Active)
255 E. Liberty St.
Suite 225, Ann Arbor, MI