Jump to content
Aerosol

Exploiting Fundamental Weaknesses in Command and Control (C&C) Panels

Recommended Posts

Posted

What This Talk is All About ?!

? Learning about the different insights gathered from real-time

testing of C&C panels

? Understanding the facts and C&C design of botnet families

? Zeus / ICE 1X/ Citadel / BetaBot etc.

? Busting several myths about C&C architecture and deployments

? Learning what methods to follow when direct exploitation is not

possible

? Utilizing multiple vulnerabilities to attack C&C panels

? Gathering information using weak C&C configurations

? Building C&C intelligence for Incident Response and automated

solutions

Read more: http://www.secniche.org/blackhat-2014/blackhat_2014_briefings_presentation_exp_cc_flaws_adityaks.pdf

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...