Version v.1.0

other: Attacking the Unknown

Event_large

In this presentation, I will discuss automating the process of identifying, deanonymizing, profiling and attacking (IDPA) malicious users.

Anonymization techniques are a double-edged sword like any invention in life, for example; they can be used by journalists to communicate more safely with whistleblowers or by malicious users to commit cyber-crimes without getting caught. I started this research a year ago to automate the process of identifying, deanonymizing, profiling and attacking (IDPA) malicious users basically behind TOR, VPN and Proxies with zero human interaction and I finally nailed it!

Info

Day: 2015-09-11
Start time: 19:15
Duration: 01:00
Room: Tesla

Links:

Feedback

Click here to let us know how you liked this event.

Concurrent events