Главная
Study mode:
on
1
Introduction
2
Who are the victims
3
The attack chain
4
infecting legitimate websites
5
cPanel checker
6
iframe ER agent
7
iframe features
8
IP Filter
9
UTM Dashboard
10
Statistics
11
System Architecture
12
Web Inject
13
Role traffic
14
Session spy
15
How did we find them
16
SocksFabric
17
Tunneling
18
Conversations
19
Check Mail
20
Victim Distribution
21
Conclusion
22
QA
Description:
Explore a comprehensive analysis of Russian cyber attack techniques through live demonstrations. Delve into the intricate attack chain, examining methods like infecting legitimate websites, utilizing cPanel checkers, and deploying iframe agents. Gain insights into IP filtering, UTM Dashboard usage, and web inject strategies. Investigate the role of traffic manipulation, session spying, and the SocksFabric tunneling system. Learn about victim distribution patterns and engage in a Q&A session to deepen your understanding of these sophisticated cyber threats.

Witness the Russian Attack - Live Demos of Their Steps, Tools, Techniques

WEareTROOPERS
Add to list