<html>
<head>
<meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
</head>
<body bgcolor="#FFFFFF" text="#000000">
If you're going to read this: <a
href="http://labs.bitdefender.com/2012/06/flame-the-story-of-leaked-data-carried-by-human-vector/">http://labs.bitdefender.com/2012/06/flame-the-story-of-leaked-data-carried-by-human-vector/<br>
</a>(which you should) then you have to read it listening to <a
href="http://www.youtube.com/watch?v=PVi8bJFIac8">this</a> or <a
href="http://www.youtube.com/watch?v=z5X5zh00rdg">this</a>. That
plus the crypto-windows-update technique makes it a work of art.<br>
<br>
The take-away is that controlling the emergent behavior of your
opponent's information infrastructure with replicant techniques is
... <a href="http://www.youtube.com/watch?v=eFVi-j-yIr0">effective</a>.<br>
<br>
-dave<br>
<br>
<br>
<pre class="moz-signature" cols="72">--
INFILTRATE - the world's best offensive information security conference.
April 2013 in Miami Beach
<a class="moz-txt-link-abbreviated" href="http://www.infiltratecon.com">www.infiltratecon.com</a>
</pre>
</body>
</html>