Anonymous Post-Compromise Control via Tor Hidden Services

Presented at WAHCKon 2013, May 4, 2013, 1:15 p.m. (35 minutes)

This talk covers how a compromised system can be controlled via the Tor network, providing the aggressor with anonymity, as well as a flexible and useful (albeit slow) control channel.


Presenters:

  • David Taylor - Perth, awwwww yeah.
    David is a breaker, not a builder. Despite a diverse information security career, he is happiest when he is hacking stuff. He is also a great guy, I would hang out with him in vegas again.

Similar Presentations: