Главная
Study mode:
on
1
Intro
2
Disclaimer !
3
What This Talk is All About?
4
Rationale !
5
C&C Panels Overview
6
C&C Components Protection
7
C&C Gates
8
C&C Attack Models
9
Network Traffic Analysis (2)
10
Multiple C&C Panels - Same Server
11
Multiple C&C Panels - Server
12
Confirming Base C&C Components
13
Installation Component Check
14
Port Mapping for Similar Resources
15
C&C Deployment on XAMPP
16
Root Directory Verification
17
Vulnerability Hunting!
18
Remote Management Shells!
19
Conclusion
20
Future Work
21
Questions and Queries!
Description:
Explore techniques for exploiting fundamental weaknesses in botnet Command and Control (C&C) panels in this 27-minute Black Hat conference talk. Learn about methodologies for launching reverse attacks on centralized C&C panels to gather intelligence and build automated solutions. Examine real-world case studies demonstrating step-by-step processes for attacking and compromising C&C panels. Discover how to detect vulnerabilities and configuration flaws in remote C&C panels, and understand the use of automated tools for easier testing. Gain insights into C&C panel components, protection mechanisms, attack models, and network traffic analysis. Investigate multiple C&C panel scenarios, installation component checks, and deployment verification techniques. Delve into vulnerability hunting and remote management shells as part of a comprehensive approach to understanding and exploiting botnet infrastructure weaknesses.

What Goes Around Comes Back Around - Exploiting Fundamental Weaknesses in Botnet C&C Panels

Black Hat
Add to list