Exploiting-the-Zeroth-Hour(); Developing Your Advanced Persistent Threat to Pwn the Network

Provided by: SecurityTube.net
Topic: Networking
Format: Webcast
If a security researcher or penetration tester sets out to build a botnet, where do they begin and how do they overcome serious difficulties encountered in the development of their botnet and APT malware? This webcast solves these issues by showing exactly how to create a botnet (from scratch), how to build new implants and the master controller to herd all infected systems into one user interface.

Find By Topic