AI Adoption - Drive Business Value and Organizational Impact
35% Off Finance Skills That Get You Hired - Code CFI35
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore the inner workings of a Chinese operational relay box (ORB) network in this detailed conference talk from DEF CON 33. Discover how hackers use ORB networks to obscure their true origins by creating private TOR-like networks from compromised computers. Learn about the specific tools, networks, and development techniques employed to create and operate these relay systems based on publicly available data analysis. Examine the cloud providers, data storage systems, software tools, domain names, email addresses, and passwords used to establish, maintain, and operate these networks. Gain insights into detection methods for defenders, understand abuse patterns for cloud providers, and explore the technical infrastructure behind these sophisticated obfuscation systems. Understand how attackers leverage legitimate cloud services to build resilient relay networks and the operational security practices they employ to maintain anonymity.
Syllabus
DEF CON 33 - Inside Look at a Chinese Operational Relay Network - Michael Torres, Zane Hoffman
Taught by
DEFCONConference