Build an Advanced Persistent Threat module

13th Mar 2017

Let's put the black hat on

Every day the news reports about some organization being hacked and their data stolen. I always asked myself: How is that possible? Is that hard to do? If it were me, how would I do that?
In this post I'll report my experience in building my own Advanced Persistent Threat (APT).