Overview
This course aims to teach learners how to exploit the most notorious Command and Control (C&C) toolkits used in targeted cyber attacks. The learning outcomes include understanding sophisticated attack techniques, hacking back strategies, Remote Access Trojan (RAT) terminology, and post-exploitation methods. The course covers specific toolkits such as APT1, Poison Ivy, Xtreme Rat, and Ghost RAT, along with skills like remote file upload and download, DLL side load vulnerability, and decoding implant configurations. The teaching method involves a presentation format with a duration of 33 minutes. This course is intended for cybersecurity professionals, ethical hackers, and individuals interested in advanced cyber defense strategies.
Syllabus
Intro
Disclaimer
The sophisticated attack
Hacking back
RAT terminology
Sophisticated attack hit list
APT1 & Poison Ivy
Xtreme Rat
Remote file upload
Remote file download
Ghost RAT
DLL side load vulnerability
Decode implant configs
Post exploitation
Taught by
Black Hat