top | item 39465166

Reverse Engineering an RDP and WebLogic Attack

4 points| zan | 2 years ago |nishtahir.com

1 comment

order

thecupisblue|2 years ago

It's quite amusing to see how many obfuscation layers it goes through, but also how many different security issues it relies on to propagate. Seems like there is a ton of thought put into it, but it's most probably just a collection of skiddie tools stacked on top of each other. Wonder what the end result is, anyone got a clue?