YoVDO

Digital Vengeance - Exploiting Notorious C&C Toolkits

Offered By: Cooper via YouTube

Tags

Hack.lu Courses Cybersecurity Courses Digital Forensics Courses Advanced Persistent Threats Courses Exploit Development Courses

Course Description

Overview

Explore the world of notorious Command and Control (C&C) toolkits in this 28-minute conference talk from Hack.lu 2017. Delve into the vulnerabilities of popular Remote Administration Tools (RATs) used in targeted attacks, including Gh0st RAT, Plug-X, and XtremeRAT. Learn how these weaknesses can be exploited to turn the tables on attackers, transforming the hunter into the hunted. Examine patterns in APT reports, discover exploits for remote execution and information disclosure, and gain insights into the ethics and legality of counter-attacks. Presented by Waylon Grange, an experienced reverse engineer and Senior Threat Researcher at Symantec, this talk covers topics such as RAT terminology, sophisticated attack hit lists, and post-exploitation techniques.

Syllabus

Intro
Disclaimer
The sophisticated attack
Hacking back
RAT terminology
Sophisticated attack hit list
APT1 & Poison Ivy
Xtreme Rat
Remote file upload
Remote file download
Ghost RAT
DLL side load vulnerability
Decode implant configs
Post exploitation


Taught by

Cooper

Related Courses

Foundations of Computer Science for Teachers
The University of Texas at Austin via edX
Computer Forensics
Rochester Institute of Technology via edX
FinTech Security and Regulation (RegTech)
The Hong Kong University of Science and Technology via Coursera
Cyber Security
CEC via Swayam
Fundamentos de Ciberseguridad: un enfoque práctico
Inter-American Development Bank via edX