If you're going to read this: http://labs.bitdefender.com/2012/06/flame-the-story-of-leaked-data-carried-by-human-vector/ (which you should) then you have to read it listening to this <http://www.youtube.com/watch?v=PVi8bJFIac8> or this <http://www.youtube.com/watch?v=z5X5zh00rdg>. That plus the crypto-windows-update technique makes it a work of art.
The take-away is that controlling the emergent behavior of your opponent's information infrastructure with replicant techniques is ... effective <http://www.youtube.com/watch?v=eFVi-j-yIr0>. -dave -- INFILTRATE - the world's best offensive information security conference. April 2013 in Miami Beach www.infiltratecon.com
signature.asc
Description: OpenPGP digital signature
_______________________________________________ Dailydave mailing list [email protected] https://lists.immunityinc.com/mailman/listinfo/dailydave
