Exploiting-the-Zeroth-Hour(); Developing Your Advanced Persistent Threat to Pwn the Network

If a security researcher or penetration tester sets out to build a botnet, where do they begin and how do they overcome serious difficulties encountered in the development of their botnet and APT malware? This webcast solves these issues by showing exactly how to create a botnet (from scratch), how to build new implants and the master controller to herd all infected systems into one user interface.

Provided by: SecurityTube.net Topic: Networking Date Added: Oct 2013 Format: Webcast

Find By Topic