Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

What Goes Around Comes Back Around - Exploiting Fundamental Weaknesses in Botnet C&C Panels

Black Hat via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore techniques for exploiting fundamental weaknesses in botnet Command and Control (C&C) panels in this 27-minute Black Hat conference talk. Learn about methodologies for launching reverse attacks on centralized C&C panels to gather intelligence and build automated solutions. Examine real-world case studies demonstrating step-by-step processes for attacking and compromising C&C panels. Discover how to detect vulnerabilities and configuration flaws in remote C&C panels, and understand the use of automated tools for easier testing. Gain insights into C&C panel components, protection mechanisms, attack models, and network traffic analysis. Investigate multiple C&C panel scenarios, installation component checks, and deployment verification techniques. Delve into vulnerability hunting and remote management shells as part of a comprehensive approach to understanding and exploiting botnet infrastructure weaknesses.

Syllabus

Intro
Disclaimer !
What This Talk is All About?
Rationale !
C&C Panels Overview
C&C Components Protection
C&C Gates
C&C Attack Models
Network Traffic Analysis (2)
Multiple C&C Panels - Same Server
Multiple C&C Panels - Server
Confirming Base C&C Components
Installation Component Check
Port Mapping for Similar Resources
C&C Deployment on XAMPP
Root Directory Verification
Vulnerability Hunting!
Remote Management Shells!
Conclusion
Future Work
Questions and Queries!

Taught by

Black Hat

Reviews

Start your review of What Goes Around Comes Back Around - Exploiting Fundamental Weaknesses in Botnet C&C Panels

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.