Presented at
WAHCKon 2013,
May 4, 2013, 1:15 p.m.
(35 minutes).
This talk covers how a compromised system can be controlled via the Tor network, providing the aggressor with anonymity, as well as a flexible and useful (albeit slow) control channel.
Presenters:
-
David Taylor
- Perth, awwwww yeah.
David is a breaker, not a builder. Despite a diverse information security career, he is happiest when he is hacking stuff. He is also a great guy, I would hang out with him in vegas again.
Similar Presentations: