Malicious Malware: Attacking The Attackers, Part 1

by Thorsten Holz, Frederic Raynal
Sept. 15, 2017 1 comment Pen Testing & Audits

This article explores measures to attack those malicious attackers who seek to harm our legitimate systems. The proactive use of exploits and bot networks that fight other bot networks, along with social engineering and attacker techniques are all discussed in an ethical manner.

Steven Ulm 6 months ago

Good presentation, great arguments! It was a pleasure reading it!