Two interns at Matasano Security exposed security flaws in some of the most widely used remote administration tools, which can supposedly be used to defend against the attackers. Can you explain the RAT security flaws that were discovered and how they can be used for defense purposes?
