Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Digital Vengeance - Exploiting the Most Notorious C&C Toolkits

Black Hat via YouTube

Overview

This course aims to teach learners how to exploit the most notorious Command and Control (C&C) toolkits used in targeted cyber attacks. The learning outcomes include understanding sophisticated attack techniques, hacking back strategies, Remote Access Trojan (RAT) terminology, and post-exploitation methods. The course covers specific toolkits such as APT1, Poison Ivy, Xtreme Rat, and Ghost RAT, along with skills like remote file upload and download, DLL side load vulnerability, and decoding implant configurations. The teaching method involves a presentation format with a duration of 33 minutes. This course is intended for cybersecurity professionals, ethical hackers, and individuals interested in advanced cyber defense strategies.

Syllabus

Intro
Disclaimer
The sophisticated attack
Hacking back
RAT terminology
Sophisticated attack hit list
APT1 & Poison Ivy
Xtreme Rat
Remote file upload
Remote file download
Ghost RAT
DLL side load vulnerability
Decode implant configs
Post exploitation

Taught by

Black Hat

Reviews

Start your review of Digital Vengeance - Exploiting the Most Notorious C&C Toolkits

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.