Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Shedding Light on Web Isolation Technologies and Their Bypass Techniques - C2 Communication via Outlook Using SMTP and IMAP

BSidesLV via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore web isolation technologies and their vulnerabilities in this 40-minute conference talk that demonstrates how attackers can bypass HTTP/HTTPS blocking mechanisms. Learn how threat actors establish command and control (C2) communication channels through Outlook using SMTP and IMAP protocols to circumvent web isolation defenses. Discover real-world examples of malware campaigns that exploit these email protocols for covert communication, and understand how cybercriminals leverage legitimate email services to maintain persistent access to compromised systems. Gain practical knowledge of detection methodologies and defensive strategies to identify and mitigate these bypass techniques, including specific rules and monitoring approaches that security teams can implement to protect against email-based C2 communications that evade traditional web filtering solutions.

Syllabus

- Date/Time: Monday, 15:00–15:45

Taught by

BSidesLV

Reviews

Start your review of Shedding Light on Web Isolation Technologies and Their Bypass Techniques - C2 Communication via Outlook Using SMTP and IMAP

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.