Главная
Study mode:
on
1
Intro
2
Disclaimer
3
The sophisticated attack
4
Hacking back
5
RAT terminology
6
Sophisticated attack hit list
7
APT1 & Poison Ivy
8
Xtreme Rat
9
Remote file upload
10
Remote file download
11
Ghost RAT
12
DLL side load vulnerability
13
Decode implant configs
14
Post exploitation
Description:
Explore the world of notorious Command and Control (C&C) toolkits in this 28-minute conference talk from Hack.lu 2017. Delve into the vulnerabilities of popular Remote Administration Tools (RATs) used in targeted attacks, including Gh0st RAT, Plug-X, and XtremeRAT. Learn how these weaknesses can be exploited to turn the tables on attackers, transforming the hunter into the hunted. Examine patterns in APT reports, discover exploits for remote execution and information disclosure, and gain insights into the ethics and legality of counter-attacks. Presented by Waylon Grange, an experienced reverse engineer and Senior Threat Researcher at Symantec, this talk covers topics such as RAT terminology, sophisticated attack hit lists, and post-exploitation techniques.

Digital Vengeance - Exploiting Notorious C&C Toolkits

Cooper
Add to list