description
Introduction
Presentation
code
Setup
Initial Setup & Installation
VM Installation & Verification
Attacking VM Setup
Victim VM Setup
notes
Attacking Program (C2 Server)
Overview
Installation
Usage & CLI Commands
Configuration
Security Features
notes
EpiRootkit
Deployment
Connection & Authentication
Features
Connection
Password Protection
Command Execution
Crypto
Bonus Features
Fileless Dropper & Rootkit Loader
Stealth Hooks & daniel.* Commands
Encrypted C2, Persistence & Auth
Symbol Resolution & Ftrace Hooks
Remote Exec & File Transfer
Command Execution
Configuration Justifications
Security Interaction with C2
code
Submission
Handout Format
code
Resources
savings
Tux Fan Club: Chasse au Trésor Pirate
favorite
Un dernier mot
menu
search
Search
GitHub
Enable dark mode
Enable light mode
to navigate
to select
to close
cancel
Home
Submission
On this page
Table of Contents
code
Submission
code
Handout Format