Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Inside Look at a Chinese Operational Relay Network

DEFCONConference via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore the inner workings of a Chinese operational relay box (ORB) network in this detailed conference talk from DEF CON 33. Discover how hackers use ORB networks to obscure their true origins by creating private TOR-like networks from compromised computers. Learn about the specific tools, networks, and development techniques employed to create and operate these relay systems based on publicly available data analysis. Examine the cloud providers, data storage systems, software tools, domain names, email addresses, and passwords used to establish, maintain, and operate these networks. Gain insights into detection methods for defenders, understand abuse patterns for cloud providers, and explore the technical infrastructure behind these sophisticated obfuscation systems. Understand how attackers leverage legitimate cloud services to build resilient relay networks and the operational security practices they employ to maintain anonymity.

Syllabus

DEF CON 33 - Inside Look at a Chinese Operational Relay Network - Michael Torres, Zane Hoffman

Taught by

DEFCONConference

Reviews

Start your review of Inside Look at a Chinese Operational Relay Network

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.