Version v.1.0
other: Attacking the Unknown
In this presentation, I will discuss automating the process of identifying, deanonymizing, profiling and attacking (IDPA) malicious users.
Anonymization techniques are a double-edged sword like any invention in life, for example; they can be used by journalists to communicate more safely with whistleblowers or by malicious users to commit cyber-crimes without getting caught. I started this research a year ago to automate the process of identifying, deanonymizing, profiling and attacking (IDPA) malicious users basically behind TOR, VPN and Proxies with zero human interaction and I finally nailed it!
Info
Day:
2015-09-11
Start time:
19:15
Duration:
01:00
Room:
Tesla
Links:
Feedback
Click here to let us know how you liked this event.
Concurrent events
Speakers
Mohamed Bedewi |