Emerging attack vectors - RSA slide deck

From Botnets.fr
Revision as of 02:07, 25 November 2012 by Eric.freyssinet (talk | contribs)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

(Publication) Google search: [1]

Emerging attack vectors - RSA slide deck
120px
Botnet
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol DNS
Date 2012 / 2012-03-07
Editor/Conference
Link http://pen-testing.sans.org/blog/2012/03/07/emerging-attack-vectors-rsa-slide-deck pen-testing.sans.org (pen-testing.sans.org Archive copy)
Author Ed Skoudis
Type

Abstract

With DNS as a command and control channel, now the victim machine doesn’t need outbound connectivity at all …as long as it can resolve names through a name server with recursive

look-ups on the Internet, it can reach the attacker: CNAME, TXT, SOA, etc

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR927,
   editor = {},
   author = {Ed Skoudis},
   title = {Emerging attack vectors - RSA slide deck},
   date = {07},
   month = Mar,
   year = {2012},
   howpublished = {\url{http://pen-testing.sans.org/blog/2012/03/07/emerging-attack-vectors-rsa-slide-deck pen-testing.sans.org}},
 }