What Goes Around Comes Back Around - Exploiting Fundamental Weaknesses in Botnet C&C Panels
Offered By: Black Hat via YouTube
Course Description
Overview
Explore techniques for exploiting fundamental weaknesses in botnet Command and Control (C&C) panels in this 27-minute Black Hat conference talk. Learn about methodologies for launching reverse attacks on centralized C&C panels to gather intelligence and build automated solutions. Examine real-world case studies demonstrating step-by-step processes for attacking and compromising C&C panels. Discover how to detect vulnerabilities and configuration flaws in remote C&C panels, and understand the use of automated tools for easier testing. Gain insights into C&C panel components, protection mechanisms, attack models, and network traffic analysis. Investigate multiple C&C panel scenarios, installation component checks, and deployment verification techniques. Delve into vulnerability hunting and remote management shells as part of a comprehensive approach to understanding and exploiting botnet infrastructure weaknesses.
Syllabus
Intro
Disclaimer !
What This Talk is All About?
Rationale !
C&C Panels Overview
C&C Components Protection
C&C Gates
C&C Attack Models
Network Traffic Analysis (2)
Multiple C&C Panels - Same Server
Multiple C&C Panels - Server
Confirming Base C&C Components
Installation Component Check
Port Mapping for Similar Resources
C&C Deployment on XAMPP
Root Directory Verification
Vulnerability Hunting!
Remote Management Shells!
Conclusion
Future Work
Questions and Queries!
Taught by
Black Hat
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Proactive Computer Security
University of Colorado System via Coursera Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Hacker101
HackerOne via Independent CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent