Analysis of the crypto used by the Trojan.Khan DDoS bot A recent blog post described our analysis of the crypto algorithm used by the Armageddon DDoS malware. This article continues our ongoing series on reversing the crypto mechanisms used by contemporary DDoS botnets; our guest of honor today will be a bot we have been […]
Latest Comments