PowerBI Data Analyst - Create visualizations and dashboards from scratch
Earn a Michigan Engineering AI Certificate — Stay Ahead of the AI Revolution
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore the inner workings of a Chinese operational relay box (ORB) network in this detailed conference talk from DEF CON 33. Discover how hackers use ORB networks to obscure their true origins by creating private TOR-like networks from compromised computers. Learn about the specific tools, networks, and development techniques employed to create and operate these relay systems based on publicly available data analysis. Examine the cloud providers, data storage systems, software tools, domain names, email addresses, and passwords used to establish, maintain, and operate these networks. Gain insights into detection methods for defenders, understand abuse patterns for cloud providers, and explore the technical infrastructure behind these sophisticated obfuscation systems. Understand how attackers leverage legitimate cloud services to build resilient relay networks and the operational security practices they employ to maintain anonymity.
Syllabus
DEF CON 33 - Inside Look at a Chinese Operational Relay Network - Michael Torres, Zane Hoffman
Taught by
DEFCONConference