Understanding both the attacker's tools and the defender's mechanisms is key to designing effective security strategies. This session presents an experimental study on how various open-source backdoor C2 tools (such as Sliver, Merlin, and Villain) perform against open-source defense and detection platforms (SIEM, EDR, IPS/IDS). We will test whether these backdoors can be detected or blocked in a custom-built environment and analyze their behavior and detection results. By uncovering defense blind spots and providing strategic recommendations, this session aims to give attendees a more comprehensive perspective on offensive and defensive strategies. It is suitable for those interested in open-source tools, attack techniques, and defense mechanisms. No deep technical background is required—just come and listen!
TOPIC / TRACK
Open Source Security Forum
LOCATION
Taipei Nangang Exhibition Center, Hall 2
7F 703
LEVEL
General General sessions explore new
cybersecurity knowledge and
non-technical topics, ideal for those with limited or no
prior cybersecurity knowledge.
SESSION TYPE
Breakout Session
LANGUAGE
Chinese
SUBTOPIC
Blue Team
Red Team
Open Source Security
CYBERSEC 2025 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy 。