Oct. 20, 2022, 10 a.m. | Wild West Hackin' Fest

Wild West Hackin' Fest www.youtube.com

Attend Wild West Hackin' Fest (WWHF) in Deadwood, In-Person and Virtual!
https://wildwesthackinfest.com/deadwood/


Command and control (C2) infrastructure are vital to the operation of botnets and their operators take active measures to prevent their discovery. In this presentation, I demonstrate that an attacker could leverage public advertisement services to obfuscate the source of their command and control servers by co-opting web users’ browsers to smuggle data.
My colleagues and I created a system that garners unaware users that could provide the …

botnet browser san san diego smuggling wwhf

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Cyber Security Cloud Solution Architect

@ Microsoft | London, London, United Kingdom

Compliance Program Analyst

@ SailPoint | United States

Software Engineer III, Infrastructure, Google Cloud Security and Privacy

@ Google | Sunnyvale, CA, USA

Cryptography Expert

@ Raiffeisen Bank Ukraine | Kyiv, Kyiv city, Ukraine

Senior Cyber Intelligence Planner (15.09)

@ OCT Consulting, LLC | Washington, District of Columbia, United States