Malicious Malware: Attacking The Attackers, Part 2

by Thorsten Holz, Frederic Raynal
Sept. 15, 2017 1 comment Pen Testing & Audits

This article explores measures to attack those malicious attackers who seek to harm our legitimate systems. The proactive use of exploits and bot networks that fight other bot networks, along with social engineering and attacker techniques are all discussed in an ethical manner.

Steven Ulm 6 months ago

First part was slightly better researched but this one's good too. Thank you Thorsten and Frederic!