Research and Development

Slides from SOURCE Boston 2009, presenting heyoka, a new DNS tunneling tool that uses spoofed traffic to avoid detection and multiple encodings to improve speed. By Alberto Revelli and Nico Leidecker.

Heyoka-SOURCEBoston2009
1.3 MiB
MD5 hash: 23faa2e1e5f9d4e25e5a440d9c740968
Details

Request to be added to the Portcullis Labs newsletter

We will email you whenever a new tool, or post is added to the site.

Your Name (required)

Your Email (required)