Know the adversary: Infiltrating Command and Control Comm’s

A lot of security professionals have this high level idea of what the adversary looks like and, unfortunately, more often than not it's wrong. You can fix this! While infiltrating C2 comm's on botnets and adversarial comm's isn't for the faint of heart it can be done without landing you in jail and yield a far deeper understanding of what your up against and ultimately how to better defend yourself. In this talk we'll talk about the pitfalls of and how to go about infiltrating C2 (mostly) safely. We'll even cover some open source code to get you started.

Presented by