Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore web isolation technologies and their vulnerabilities in this 40-minute conference talk that demonstrates how attackers can bypass HTTP/HTTPS blocking mechanisms. Learn how threat actors establish command and control (C2) communication channels through Outlook using SMTP and IMAP protocols to circumvent web isolation defenses. Discover real-world examples of malware campaigns that exploit these email protocols for covert communication, and understand how cybercriminals leverage legitimate email services to maintain persistent access to compromised systems. Gain practical knowledge of detection methodologies and defensive strategies to identify and mitigate these bypass techniques, including specific rules and monitoring approaches that security teams can implement to protect against email-based C2 communications that evade traditional web filtering solutions.
Syllabus
- Date/Time: Monday, 15:00–15:45
Taught by
BSidesLV