How we accidentally created our own RAT/C2/Distributed Computing Network

Presented at DerbyCon 7.0 Legacy (2017), Sept. 22, 2017, 1 p.m. (50 minutes).

Rat/C2/Botnet/Distributed Computing… Sure there are differences, but they all share common attributes and functionality. In an effort to create a new distributed computing tool for pentesting, we created a fairly functional generic tool that comprises the most common functions of all of these. What to see what it is and how we developed it? We will be covering everything, in general terms, from the basics of Master/Slave processing and communication to coding up a final solution in Python. If you are interested, please stop by. Adam Compton has been a programmer, researcher, professional pentester, father, husband, and farmer. Adam has over 2 decades of programming, network security, incident response, security assessment, and penetration testing experience. Throughout Adam's career, he has worked for both federal and international government agencies as well as within various aspects of the private sector. Bill Harshbarger has worked in information security for a decade, starting in incident response and forensics, and is now a pentester who has worked with clients ranging from 20 person co-ops to fortune 100 headquarters. @tatanus

Presenters:

Links:

Similar Presentations: