Exploiting_the_Zeroth_Hour(); Developing your Advanced Persistent Threat to Pwn the Network

Description:Advanced Persistent Threats (APT) and Botnets represent one of the largest security concerns with regards to network defense and exploitation. Most security professionals know about these advanced exploitation tools and tactics; many people have even discussed the overall concept regarding command and control of networked systems, however, still a lot of our experts do not yet understand how to create a botnet and establish unhindered command and control to many systems across the Internet. (Such knowledge is essential to be able to identify key indicators that your network may be compromised). If a security researcher or penetration tester sets out to build a botnet, where do they begin and how do they overcome serious difficulties encountered in the development of their botnet and APT malware? This talk solves these issues by showing exactly how to create a botnet (from scratch), how to build new implants and the master controller to herd all infected systems into one user interface, how to engineer new exploit payloads into the botnet, and includes live demos of Splinter, the Remote Administration Tool (RAT) we created to demonstrate the entire process and release open-source to the community for use.

And so what about defense you ask? One word answers this: PWNED!!! As systems continue to be exploited on a daily basis, the end result of this presentation is to show how to build these botnets such that white-hat hackers, penetration testers, red team experts, and computer incident responders can tie this knowledge into implementing better security measures for the protection of our networks.

Presented by