Astute Zombie Crush

Hacking the Hackers!

BlackHat hackers ravage computer systems, infecting them with malware, and acquiring information for their own means but do these hackers stop and think about the security posture of their own hacking infrastructure? 

astute-zombie-crush.png

Join us as we dive into a series of interactive hands-on labs where we apply our knowledge of common web application vulnerabilities (e.g. SQLi, XSS, CSRF, etc...) and binary Reverse Engineering (e.g. ida, windbg, etc...) techniques to research and develop exploits for malicious C2 servers commonly used by Black hat hackers to manage their botnets of zombie computers.