Malware at Stake

An Official Malware Research Blog of SecNiche Security Labs. Analysis, straight from the hidden and underground.

Sunday, August 24, 2014

BlackHat 2014 - Botnet C&C Panel Talk

Whitepaper: http://secniche.org/blackhat-2014/blackhat_2014_briefings_whitepaper_exp_cc_flaws_adityaks.pdf

Posted by Aditya K Sood at 8:41 AM
Labels: blackhat, Botnets, Command and Control, Malware
Newer Post Older Post Home

Disclaimer

The opinions and views expressed on this blog are completely based on our independent research and do not relate to any of our previous or present employers.

About This Blog and Team

We are a team of researchers that work collaboratively to unearth and dissect the malware. This blog is dedicated to free and open research and talks about our experience with malicious code that we encounter in our day to day life.

Team Members:

Aditya K Sood
Rohit Bansal



Book !

Book !
Targeted Cyber Attacks !

Subscribe

Posts
Atom
Posts
Comments
Atom
Comments

Labels

Cybercrime Botnets Browser Exploit Packs Chinese Malware Malware Obfuscation Targeted Attacks Underground Enterprise Virus Bulletin Advanced Persistent Threats Cyberwar EZine Hack In The Box Hacking IEEE Internet Computing IEEE Security and Privacy MS12-043 Metasploit Microsoft XML Core Services Pay-per-install ProPack Redirection Attacks SQL Injections Security Sweet Orange Exploit Pack Targeted Atatcks Virtual Hosting

Pentester's Blog

Loading...

Readers Online

Powered by SecNiche

SecNiche Security


Live Traffic

Hack In The Box - Papers

Issue 9 - Game of Win 32/64 Takeover - Bot Wars
Issue 8 - Exploit Distribution Mechanism in BEPs
Issue 7 - Extending SQL Injections using Buffer Overflows
Issue 6 - Botnet Resistant Coding
Issue 5 - Web Virtual Hosting Infections
Issue 4 - Notorious Datacenter Servers
Issue 3 - Chinese Malware Factory
Issue 2 - Open Redirect Wreck Off
Issue 1 - Malware Obfuscation

Virus Bulletin Papers

July'12- Inside the ICE IX bot, descendent of Zeus
June'12- Malware Design Strategies for Circumventing Detection and Prevention Controls (Part 2)
May'12- Malware Design Strategies for Circumventing Detection and Prevention Controls (Part 1)
April'12- Zombifying Targets using Phishing Campaigns
January'12- Dissecting NGR Bot Framework
November'11- The Art of Stealing Banking Information
August'11- SpyEye Bot - Aggressive Exploitation Tactics
July'11- SpyEye Malware Infection Framework
June'11- A Browser Malware Taxonomy

Blog Archive

  • ►  2017 (1)
    • ►  May (1)
  • ►  2015 (5)
    • ►  September (1)
    • ►  May (1)
    • ►  March (1)
    • ►  February (2)
  • ▼  2014 (4)
    • ▼  August (1)
      • BlackHat 2014 - Botnet C&C Panel Talk
    • ►  April (1)
    • ►  February (1)
    • ►  January (1)
  • ►  2013 (12)
    • ►  November (1)
    • ►  September (1)
    • ►  June (1)
    • ►  May (1)
    • ►  March (2)
    • ►  February (2)
    • ►  January (4)
  • ►  2012 (35)
    • ►  December (1)
    • ►  October (1)
    • ►  September (4)
    • ►  August (5)
    • ►  July (4)
    • ►  June (4)
    • ►  May (4)
    • ►  April (7)
    • ►  March (4)
    • ►  February (1)
  • ►  2011 (36)
    • ►  November (2)
    • ►  October (3)
    • ►  September (2)
    • ►  August (3)
    • ►  July (2)
    • ►  June (4)
    • ►  May (7)
    • ►  April (6)
    • ►  February (5)
    • ►  January (2)
  • ►  2010 (6)
    • ►  November (3)
    • ►  October (1)
    • ►  August (2)
Awesome Inc. theme. Theme images by Jason Morrow. Powered by Blogger.