We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Esoteric Exfiltration

00:00

Formal Metadata

Title
Esoteric Exfiltration
Title of Series
Number of Parts
93
Author
License
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
When the machines rise up and take away our freedom to communicate we're going to need a way out. Exfiltration of data across trust boundaries will be our only means of communication. How do we do that when the infrastructure we built to defend ourselves is the very boundary we must defeat? We use the same pathways we used to, but bend the rules to meet our needs. Whether its breaking protocol, attaching payloads, or pirating the airwaves we'll find a way. We'll cover using a custom server application to accept 'benign' traffic, using social and file sharing to hide messages, as well as demo some long range mesh RF hardware you can drop at a target for maximum covert ops. Bio: Willa Cassandra Riggins is a penetration tester at Veracode, and was previously part of the Lockheed Martin CIS Red Team. She started her career as a developer and pivoted into security to help fight the pandemic that is developer apathy. Her background spans the software development lifecycle, but her heart is in root shells and crown jewels. She can be found making things at FamiLAB in Orlando, hacking at the local DC407 meet-ups, staffing the socials at BSides Orlando, and marketing all the things at OWASP Orlando.
Software testingComputer-assisted translationTwitterPoint (geometry)Family
AuthorizationHypermediaInformationTerm (mathematics)Sensitivity analysisTwitterServer (computing)Heat transferSoftwareGame controllerUniform resource locatorInsertion loss
Insertion lossDependent and independent variablesIncidence algebraWeightRight angleBinary file
SoftwareArchaeological field survey2 (number)WeightInformation security
Covering spaceBitCausality
Mobile appFirewall (computing)FlagFacebookRandomizationTwitterBit rateView (database)Computer wormEndliche ModelltheorieNormal (geometry)CausalityFile Transfer ProtocolCommunications protocolWeb 2.0HypermediaPattern languageAuditory maskingMikroblogSingle-precision floating-point formatForm (programming)Direct numerical simulation1 (number)Server (computing)State of matterMultiplication signFigurate numberApplication service providerBinary codeLimit (category theory)Streaming mediaMultilaterationData managementMereologyCodierung <Programmierung>Right angleWriting
MathematicsFigurate numberGodDrop (liquid)CausalityGame controllerFacebookPoint (geometry)Latent heatCommunications protocolDemo (music)SoftwareBitRight angleTelnetNetwork topology
Computer networkDrop (liquid)Virtual machineSerial portMedical imagingBitRight angleMultiplication signCountingService (economics)Binary fileFirewall (computing)Range (statistics)FacebookHoaxGroup actionStatistical hypothesis testingSoftware testing1 (number)Level (video gaming)Proxy serverOscillationArithmetic meanComputer fileMereologyHand fanSlide ruleVermaschtes NetzVibrationStreaming mediaCommunications protocolLaserDirectory serviceBlock (periodic table)TwitterElectronic mailing listDirect numerical simulationInternetworkingQuicksortTheorySeries (mathematics)Connected spaceInheritance (object-oriented programming)Library (computing)SteganographyCausalityCategory of beingLogical constant
AutomationSocial classAxiom of choiceRight angleFacebookMorley's categoricity theoremHeat transferMalwareComputer fileTwitterBlock (periodic table)WebsiteData conversionFrequencyComputer wormService (economics)Software bugStreaming mediaVirtual machineProxy serverIntrusion detection systemMobile appPhysical systemGoodness of fitHand fanSteganographyFirewall (computing)Cartesian coordinate systemContext awarenessCommunications protocolFigurate numberChemical equationCodeHoaxMultiplication signRandom matrixInteractive television
Computer fileCodeModule (mathematics)BitPlug-in (computing)Point (geometry)Cartesian coordinate systemCuboidCausality
Function (mathematics)Right angleSet (mathematics)Client (computing)Medical imagingComputer fileComputer animation
Module (mathematics)Module (mathematics)TouchscreenVideo projectorCodeJSONXMLUML
Data acquisitionCodeFamily
Module (mathematics)Demo (music)Multiplication signCodeInstallation artElectric generatorComputer wormComputer hardware
Code
Computer animation
Transcript: English(auto-generated)