Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore the vulnerabilities and exploitation potential of DarkComet, a well-known Remote Access Trojan, in this Security BSides London conference talk. Learn how to leverage a public exploit to gather crucial information about an attacker's campaign, including the number of infected machines, their locations, and stolen data. Discover advanced techniques for identifying the attacker beyond basic IP and domain information, potentially uncovering personal details such as email addresses, social media accounts, and even physical locations. Gain insights into defensive strategies against DarkComet and learn how to extract key information from attacks. The presentation concludes with a case study demonstrating the extent of information that can be obtained from an attacker using these methods.