Cracking the encrypted C&C protocol of the ZeroAccess botnet
Jump to navigation
Jump to search
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.
(Publication) Google search: [1]
Cracking the encrypted C&C protocol of the ZeroAccess botnet | |
---|---|
Botnet | ZeroAccess |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2012 / 2012 |
Editor/Conference | Virus Bulletin |
Link | http://www.virusbtn.com/pdf/conference slides/2012/Morris-VB2012.pdf (Archive copy) |
Author | John Morris |
Type |
Abstract
“
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1195, editor = {Virus Bulletin}, author = {John Morris}, title = {Cracking the encrypted C&C protocol of the ZeroAccess botnet}, date = {19}, month = Apr, year = {2012}, howpublished = {\url{http://www.virusbtn.com/pdf/conference_slides/2012/Morris-VB2012.pdf}}, }