Главная
Study mode:
on
1
Intro
2
Spain
3
Squid Proxy
4
Who is using this service
5
Identity theft
6
Inbox
7
Dog scammer
8
People using proxy server
9
Scammer
10
Hackers
11
intranet
12
target attack
13
demo
14
who is doing this
15
summary
Description:
Explore the power of man-in-the-middle attacks and JavaScript botnets in this Black Hat USA 2012 conference talk. Dive into mitm schemas in anonymous services and learn how to create a JavaScript botnet for analyzing connections and activities of malicious actors. Discover techniques for identifying users of proxy services, detecting identity theft, and uncovering scammers and hackers. Witness real-world demonstrations and gain insights into targeted attacks on intranets. Uncover the world of cybercrime and learn how to track and analyze the actions of bad actors using these powerful techniques.

Owning Bad Guys and Mafia with Javascript Botnets

Black Hat
Add to list