Down The Rabbit Hole: How Hackers Exploit Weak SSH Credentials To Build DDoS Botnets

Down The Rabbit Hole: How Hackers Exploit Weak SSH Credentials To Build DDoS Botnets

Presented at BlackAlps'17 and GreHack'17.

Cddd21855bb22ab49ab6faf61b67f4e6?s=128

Christophe Tafani-Dereeper

November 16, 2017
Tweet