Тёмный
No video :(

ARP Spoofing and Network Filtering to Block EDR Telemetry 

Tier Zero Security
Подписаться 15
Просмотров 335
50% 1

A PoC for a network-based EDR telemetry filtering using ARP Spoofing.
1. ARP Spoofing: Perform ARP spoofing against the victim host to make the attacker PC act as the gateway.
2. Traffic Sniffing: Sniff network traffic to intercept TLS Client Hello packets and inspect the Server Name Indication (SNI) for EDR-related domains.
3. Traffic Blocking: Utilise iptables to block traffic destined for EDR servers based on the inspection results.
The advantage of this approach compared to host firewall-based filtering is that it doesn't require admin privileges or user access to the victim host. But yes, attacker needs to be on the same network to perform ARP spoofing :)

Опубликовано:

 

14 июл 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии    
Далее
I forced EVERYONE to use Linux
22:59
Просмотров 514 тыс.
ПРОСТИ МЕНЯ, АСХАБ ТАМАЕВ
32:44
Просмотров 1,9 млн
Starman🫡
00:18
Просмотров 2,1 млн
Background o.O
0:32
Просмотров 302
This AI video generator just broke reality
22:47
Просмотров 40 тыс.
Tracking Cybercrime on Telegram
23:26
Просмотров 340 тыс.
how did I NOT know about this?
23:06
Просмотров 914 тыс.