← All talks

Ballin on a Budget

BSides Charleston · 201438:52267 viewsPublished 2014-11Watch on YouTube ↗
Speakers
Tags
CategoryTechnical
StyleTalk
About this talk
Discovering threat groups using open source intelligence gathering and honeypots, collecting and analyzing their artifacts to figure out who they are and what their capabilities were, then analyzing and reverse engineering the communications between infected nodes to build our own client that allows you to track their targets in real time.