Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Digital Vengeance - Exploiting Notorious C&C Toolkits

Cooper via YouTube

Overview

This course aims to equip learners with the knowledge and skills to exploit vulnerabilities in notorious Remote Administration Tools (RATs) used in targeted cyber attacks. The course covers identifying patterns in APT reports, understanding common RATs like Gh0st RAT and XtremeRAT, and exploiting vulnerabilities in their command and control components. The teaching method involves disclosing exploits for remote execution and information disclosure. The intended audience includes individuals interested in cybersecurity, digital forensics, and threat research.

Syllabus

Intro
Disclaimer
The sophisticated attack
Hacking back
RAT terminology
Sophisticated attack hit list
APT1 & Poison Ivy
Xtreme Rat
Remote file upload
Remote file download
Ghost RAT
DLL side load vulnerability
Decode implant configs
Post exploitation

Taught by

Cooper

Reviews

Start your review of Digital Vengeance - Exploiting Notorious C&C Toolkits

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.