• Presentation
    • Initial Setup & Installation
    • VM Installation & Verification
    • Attacking VM Setup
    • Victim VM Setup
    • Overview
    • Installation
    • Usage & CLI Commands
    • Configuration
    • Security Features
    • Deployment
    • Connection & Authentication
      • Connection
      • Password Protection
      • Command Execution
      • Crypto
      • Bonus Features
      • Fileless Dropper & Rootkit Loader
      • Stealth Hooks & daniel.* Commands
      • Encrypted C2, Persistence & Auth
      • Symbol Resolution & Ftrace Hooks
      • Remote Exec & File Transfer
    • Command Execution
    • Configuration Justifications
    • Security Interaction with C2
    • Handout Format
  • code Resources
  • savings Tux Fan Club: Chasse au Trésor Pirate
  • favorite Un dernier mot
    • GitHub
  • to navigate
  • to select
  • to close
    • Home
    On this page
    article

    Docs

    description folder

    Introduction

    code folder

    Setup

    Environment and Virtual Machine setup instructions

    article folder

    Attacking Program (C2 Server)

    The C2 server for EpiRootkit. This section details its overview, installation, usage, configuration, …

    article folder

    EpiRootkit

    Overview of the EpiRootkit kernel module and its interaction with the C2 server.

    code folder

    Submission

    code folder

    Resources

    savings

    Tux Fan Club: Chasse au Trésor Pirate

    favorite

    Un dernier mot


    © 2025 Tux Fan Club. Built with Lotus Docs