Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Black Hat USA 25: Ghost Calls - Abusing Web Con...

Avatar for Adam Crosser Adam Crosser
August 18, 2025
22

Black Hat USA 25: Ghost Calls - Abusing Web Conferencing for Covert Command and Control

Red team operators frequently struggle with establishing interactive command and control (C2) over traditional C2 channels. While long-term covert channels are well-suited for stealthy, persistent communication, they often lack the bandwidth or real-time responsiveness needed for operations such as SOCKS proxying, layer two pivoting, relaying attacks, or hidden VNC sessions. Attempting to use traditional C2 mechanisms for these activities in a well-monitored network can be slow, conspicuous, and easily detected.

Our research explores the use of real-time communication protocols as a short-term, high-speed C2 channel that seamlessly complements a covert long-term C2 infrastructure. Specifically, we leverage web conferencing protocols, which are designed for real-time, low-latency communication and operate through globally distributed media servers that function as natural traffic relays. This approach allows operators to blend interactive C2 sessions into normal enterprise traffic patterns, appearing as nothing more than a temporarily joined online meeting. Any enterprise reliant on collaboration suites could be exposed to these vectors, making it a critical concern across industries.

In this presentation, we introduce TURNt, an open-source tool that enables covert traffic routing through media servers hosted by web conferencing providers. These media servers offer a unique advantage: vendors frequently recommend whitelisting their IP addresses and exempting them from TLS inspection, significantly reducing the risk of detection. TURNt allows red team operators to maintain persistent, stealthy communication via traditional C2 while activating high-bandwidth interactive sessions for short, one-to-two-hour periods—mimicking legitimate conferencing activity.

We will demonstrate how this technique can be integrated into existing red team operations, discuss the trade-offs and detection risks, and explore countermeasures defenders can implement to identify and mitigate this emerging technique. Attendees will learn how to stealthily blend short-term, interactive C2 into existing red team operations and how to detect/mitigate these techniques defensively.

Avatar for Adam Crosser

Adam Crosser

August 18, 2025
Tweet

Transcript

  1. #BHUSA @BlackHatEvents 14 Selection Criteria • Focused on services egressing

    from user devices • Must be broadly used across enterprise roles • Applicable to non-technical departments (e.g., HR, sales) • Protocols favored by technical users were excluded • Thought through common workflows and use-cases
  2. #BHUSA @BlackHatEvents 24 Quick Disclaimer • Providers aren’t being malicious

    • Performance is the main design driver • Latency must be minimized for app reliability • These configs are often intentional not careless • Inspection or routing can overwhelm systems
  3. #BHUSA @BlackHatEvents 35 Building on Existing Work https://dl.acm.org/doi/pdf/10.1145/3517745.3561414 https://github.com/Princeton-Cabernet/zoom-analysis Enabling

    Passive Measurement of Zoom Performance in Production Networks Custom Wireshark Analyzer for Zoom Desktop Media Traffic
  4. #BHUSA @BlackHatEvents 65 Observations Regarding TURN Credentials • Usually valid

    for a couple of days • Complements an existing long-term channel • Not tied to specific calls and credentials persist post-session • Applies to common platforms like Zoom and Teams • No install or meeting required on the victim side
  5. #BHUSA @BlackHatEvents 67 What do we want to build? •

    A short-lived tunnel launched from an existing implant • Used briefly and mimics activity like a video call • Runs in parallel with long-term infrastructure • Lightweight enough to avoid clogging that primary channel • Disguised among high-traffic destinations (e.g., Zoom, Teams)
  6. #BHUSA @BlackHatEvents 69 Use-Cases and Capabilities • Fast tunnel setup

    during assumed breach scenarios • No need to provision infrastructure in advance • Operates from operator laptop or disposable VDI • Ideal for decentralized red team operations • Lightweight, flexible, and serverless by design
  7. #BHUSA @BlackHatEvents 73 Zoom Demo Example Scenario • Obtaining credentials

    from Zoom • Victim doesn’t need to do anything • Laptop is the operator laptop • Example victim system is GCP virtual machine • Demo downloading file through the channel
  8. #BHUSA @BlackHatEvents 77 Microsoft Teams Demo • Show automated retrieval

    of TURN credentials from Microsoft • Demonstrate a speed test showing a 100 MB file download • Demonstrate remote port-forwarding capability • Lab uses my local laptop and a demo virtual machine in GCP
  9. #BHUSA @BlackHatEvents 84 Defensive Considerations • Detection is hard •

    Focus on other points in the kill chain • Look for attacker tools proxied through the tunnel • Low signal at network layer • TURN creds can’t be removed
  10. #BHUSA @BlackHatEvents 85 Things to Avoid • Chasing weak signals

    like raw traffic volume • Correlating process-to-destination traffic is noisy • High effort, low return on detection accuracy • Hard to distinguish legit conferencing from abuse
  11. #BHUSA @BlackHatEvents 86 Canary Tokens • “Read Teaming” targets credentials

    and shares • Common targets: Slack, SharePoint, GitHub, Jira, etc. • Targeting credentials and other sensitive data • Canary tokens reveal enumeration early • Simple, low-cost, and highly effective control
  12. #BHUSA @BlackHatEvents 87 Detecting Proxied Attacker Tooling • Attackers proxy

    tools rather than run them locally • Focus on offensive tool behavior not the channel • Detect usage of tools like secretsdump.py or Impacket
  13. #BHUSA @BlackHatEvents 88 Future Work • Other providers beyond Zoom/Teams

    also use TURN • Opportunity for further mapping and validation • Ideal entry-point project for new researchers • Doesn’t require major tooling changes • Expands applicability of the core method
  14. #BHUSA @BlackHatEvents 89 Future Work • Current Go binaries weigh

    in around 2-3 MB • Porting to C/C++ could reduce size under 1MB • Smaller payloads improve operational stealth • Better fit for constrained or ephemeral systems • Helps with evasion and minimal footprint delivery
  15. #BHUSA @BlackHatEvents 90 Future Work • Explore default settings in

    security appliances • Identify vendor-based exclusions or allow-listing • Check if IP ranges are auto- approved by default • Investigate TLS inspection exemptions for key domains • Assess how much trust these defaults embed
  16. #BHUSA @BlackHatEvents 91 Takeaways and Questions • Web conferencing solutions

    provide a compelling vector for covert short-term command and control channels • TURNt is a new open-source tool that helps facilitate short-term C2 communication over the TURN protocol • TURN provides a provider agnostic manner for tunneling traffic through potentially trusted web conferencing infrastructure Blog Post Tool Release LinkedIn