HoneyBotting: Extracting confessions from client-side implants

Track 1

While worms and automated attacks are a huge danger, persistent attacks that leverage interactive remote command and control servers can be especially damaging. But control of a remote machine requires one major thing: cooperation of the compromised. What if our machines don’t play along?

Hackers Security Operations