The Listening: Email Client Backdoor

Jan. 15, 2012
The Listening: Email Client Backdoor
The Listening: Email Client Backdoor
The Listening: Email Client Backdoor
The Listening: Email Client Backdoor
The Listening: Email Client Backdoor
The Listening: Email Client Backdoor
The Listening: Email Client Backdoor
The Listening: Email Client Backdoor
The Listening: Email Client Backdoor
The Listening: Email Client Backdoor
The Listening: Email Client Backdoor
The Listening: Email Client Backdoor
The Listening: Email Client Backdoor
The Listening: Email Client Backdoor
The Listening: Email Client Backdoor
The Listening: Email Client Backdoor
The Listening: Email Client Backdoor
The Listening: Email Client Backdoor
The Listening: Email Client Backdoor
The Listening: Email Client Backdoor
The Listening: Email Client Backdoor
The Listening: Email Client Backdoor
The Listening: Email Client Backdoor
The Listening: Email Client Backdoor
The Listening: Email Client Backdoor
The Listening: Email Client Backdoor
The Listening: Email Client Backdoor
The Listening: Email Client Backdoor
The Listening: Email Client Backdoor
The Listening: Email Client Backdoor
The Listening: Email Client Backdoor
The Listening: Email Client Backdoor
The Listening: Email Client Backdoor
The Listening: Email Client Backdoor
The Listening: Email Client Backdoor
The Listening: Email Client Backdoor
1 of 36

More Related Content

What's hot

One Year of Porting - Post-mortem of two Linux/SteamOS launchesOne Year of Porting - Post-mortem of two Linux/SteamOS launches
One Year of Porting - Post-mortem of two Linux/SteamOS launchesLeszek Godlewski
Применение виртуализации для динамического анализаПрименение виртуализации для динамического анализа
Применение виртуализации для динамического анализаPositive Hack Days
Android Variants, Hacks, Tricks and ResourcesAndroid Variants, Hacks, Tricks and Resources
Android Variants, Hacks, Tricks and ResourcesOpersys inc.
Your Linux Passwords Are in Danger: MimiDove Meets the Challenge (lightning t...Your Linux Passwords Are in Danger: MimiDove Meets the Challenge (lightning t...
Your Linux Passwords Are in Danger: MimiDove Meets the Challenge (lightning t...Igor Korkin
Linux as a gaming platform, ideology asideLinux as a gaming platform, ideology aside
Linux as a gaming platform, ideology asideLeszek Godlewski
AV Evasion with the Veil FrameworkAV Evasion with the Veil Framework
AV Evasion with the Veil FrameworkVeilFramework

What's hot(20)

Viewers also liked

Scalable Cyber Deception (Ragsdale)Scalable Cyber Deception (Ragsdale)
Scalable Cyber Deception (Ragsdale)Michael Scovetta
DMI Summer 2010 - Final PresentationsDMI Summer 2010 - Final Presentations
DMI Summer 2010 - Final PresentationsDigital Methods Initiative
E diasporas atlasnovember2010E diasporas atlasnovember2010
E diasporas atlasnovember2010TIC-Migrations
TIC-MigrationsTIC-Migrations
TIC-MigrationsTIC-Migrations
Migration stories in a digital era.Migration stories in a digital era.
Migration stories in a digital era.DH Benelux
E-diasporas AtlasE-diasporas Atlas
E-diasporas AtlasTIC-Migrations

Similar to The Listening: Email Client Backdoor

Headless AndroidHeadless Android
Headless AndroidOpersys inc.
Unmanned Aerial Vehicles: Exploit Automation with the Metasploit FrameworkUnmanned Aerial Vehicles: Exploit Automation with the Metasploit Framework
Unmanned Aerial Vehicles: Exploit Automation with the Metasploit Frameworkegypt
Puppet Camp NYC 2014: Safely storing secrets and credentials in Git for use b...Puppet Camp NYC 2014: Safely storing secrets and credentials in Git for use b...
Puppet Camp NYC 2014: Safely storing secrets and credentials in Git for use b...Puppet
Docker Security - Secure Container Deployment on LinuxDocker Security - Secure Container Deployment on Linux
Docker Security - Secure Container Deployment on LinuxMichael Boelen
Headless Android at AnDevCon3Headless Android at AnDevCon3
Headless Android at AnDevCon3Opersys inc.
Black hat dc-2010-egypt-uav-slidesBlack hat dc-2010-egypt-uav-slides
Black hat dc-2010-egypt-uav-slidesBakry3

Similar to The Listening: Email Client Backdoor(20)

More from Michael Scovetta

Peter Norvig - NYC Machine Learning 2013Peter Norvig - NYC Machine Learning 2013
Peter Norvig - NYC Machine Learning 2013Michael Scovetta
Modern Kernel Pool Exploitation: Attacks and TechniquesModern Kernel Pool Exploitation: Attacks and Techniques
Modern Kernel Pool Exploitation: Attacks and TechniquesMichael Scovetta
Consumer Password Worst PracticesConsumer Password Worst Practices
Consumer Password Worst PracticesMichael Scovetta
A collection of examples of 64 bit errors in real programsA collection of examples of 64 bit errors in real programs
A collection of examples of 64 bit errors in real programsMichael Scovetta
If You Don't Like the Game, Hack the Playbook... (Zatko)If You Don't Like the Game, Hack the Playbook... (Zatko)
If You Don't Like the Game, Hack the Playbook... (Zatko)Michael Scovetta
Scaling Cyberwarfare (Roelker)Scaling Cyberwarfare (Roelker)
Scaling Cyberwarfare (Roelker)Michael Scovetta

Recently uploaded

UiPath Tips and Techniques for Debugging - Session 3UiPath Tips and Techniques for Debugging - Session 3
UiPath Tips and Techniques for Debugging - Session 3DianaGray10
"Software Architecture for Humans!", Eberhard Wolff "Software Architecture for Humans!", Eberhard Wolff
"Software Architecture for Humans!", Eberhard Wolff Fwdays
Brisbane MuleSoft Meetup 13 MuleSoft Maven and Managing Dependencies Part 1.pptxBrisbane MuleSoft Meetup 13 MuleSoft Maven and Managing Dependencies Part 1.pptx
Brisbane MuleSoft Meetup 13 MuleSoft Maven and Managing Dependencies Part 1.pptxBrianFraser29
Dev Dives: Mastering AI-powered Document UnderstandingDev Dives: Mastering AI-powered Document Understanding
Dev Dives: Mastering AI-powered Document UnderstandingUiPathCommunity
GIT AND GITHUB (1).pptxGIT AND GITHUB (1).pptx
GIT AND GITHUB (1).pptxGDSCCVRGUPoweredbyGo
roomos_webinar_280923_v2.pptxroomos_webinar_280923_v2.pptx
roomos_webinar_280923_v2.pptxThousandEyes

The Listening: Email Client Backdoor