Designed by operators for operators, this accelerated course is designed to help understand communications tunneling techniques and tradecraft related to cyber operations. We provide hands-on instruction on performing tunneling from SSH tunnels, proxy tunnels, TOR tunneling over SOCKS and other tunneling mechanisms through open-source projects and commercial systems. Participants of this course will be able to tunnel traffic using our cyber-range to become adept and familiarized with tunneling techniques by the first day. The second day of this course focuses on tradecraft associated with tunneling techniques learned. We provide the tools to visualize and understand how network defenders can identify tunneling techniques and how they can prevent such activity.
- Tunneling over SSH
- Tunneling over Proxies
- Tunneling over TOR with SOCKS
- Tunneling over open-source projects
- Tunneling over commercial systems
- Tunneling tradecraft
- Identification and mitigation of malicious tunneling activity