Cracking the encrypted C&C protocol of the ZeroAccess botnet
Revision as of 13:02, 28 October 2012 by Eric.freyssinet (talk | contribs)
(Publication) Google search: [1]
Cracking the encrypted C&C protocol of the ZeroAccess botnet | |
---|---|
Botnet | ZeroAccess |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2012 / 2012 |
Editor/Conference | Virus Bulletin |
Link | http://www.virusbtn.com/pdf/conference slides/2012/Morris-VB2012.pdf www.virusbtn.com (www.virusbtn.com Archive copy) |
Author | John Morris |
Type |
Abstract
“
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1195, editor = {Virus Bulletin}, author = {John Morris}, title = {Cracking the encrypted C&C protocol of the ZeroAccess botnet}, date = {02}, month = May, year = {2012}, howpublished = {\url{http://www.virusbtn.com/pdf/conference_slides/2012/Morris-VB2012.pdf www.virusbtn.com}}, }