
This class focuses on the demonstration of an Open Command Channel framework called “OpenC2RAT”, and then developing, enhancing, and deploying the “OpenC2RAT” command channel software into a target environment.
Course Length: 16 Hours
Includes a Certificate of Completion
Next scheduled date:
Description
This class focuses on the demonstration of an Open Command Channel framework called “OpenC2RAT”, and then developing, enhancing, and deploying the “OpenC2RAT” command channel software into a target environment.
As penetration testers, we all have a need to establish command and control channels in our customer environments. This can be done under the guise of an “assumed compromise” context or in a more adversarial Red Team context. The age of endpoint detection and response (EDR) solutions and application whitelisting has created significant barriers to commodity/well known malware deployment for adversarial exercises.
This class focuses on the demonstration of an Open Command Channel framework called “OpenC2RAT”, and then developing, enhancing, and deploying the “OpenC2RAT” command channel software into a target environment. Students will learn about the internal details of a command channel architecture and methods to deploy in an application-whitelisted context. The class will introduce students to blocks of code written in C#, GoLang, and Python to achieve these goals. In addition, the class will introduce some ideas to deploy existing shellcode such as Cobalt Strike Beacon or Meterpreter within a programmed wrapper to enhance success in the age of modern endpoint defense. Many of the techniques introduced in this class can be used to evade modern defensive technologies.
System Requirements
-
Student Requirements
- High-speed Internet connectivity
- Ability to connect to remote Azure deployed desktops
- A laptop that supports Windows Remote Desktop protocol
FAQ
The ability to leverage different programming languages to execute custom malware
A diversity of solutions for establishing command channels
Any security professionals who want to know the inner workings on malware
This class will help any organization that wants to start emulating advanced malware to test their defenses and detective capabilities
https://i.blackhat.com/USA-19/Thursday/us-19-Kotler-Process-Injection-Techniques-Gotta-Catch-Them-All-wp.pdf
https://docs.microsoft.com/en-us/dotnet/csharp/tutorials/intro-to-csharp/
https://www.python.org/about/gettingstarted/
https://golang.org/doc/tutorial/getting-started
Access to a PDF copy of all slideware
About the Instructor

Joff Thyer
"I write malware, hack, and teach infosec for a living!"Bio
Joff Thyer has been a Security Analyst with Black Hills Information Security (BHIS) since 2013. He has an associate in Computer Science, a B.S. in Mathematics, and an M.S. in Computer Science, as well as several certifications. The best part of a penetration test for Joff is developing sophisticated malware that tackles defensive solutions, ultimately delivering exciting wins for company engagements.
Related products
-
Multiple InstructorsLive
Workshop: AI Foundation: Cyber Security Workflow Optimization using AI Technology with Joff Thyer and Derek Banks
View Course -
Multiple InstructorsLive
Workshop: Hands on Kerberos with Tim Medin
View Course -
Multiple InstructorsLive
Workshop: Telemetry to Tactics: A Hands-On Detection Engineering Workshop with Hal Denton
View Course This product has multiple variants. The options may be chosen on the product page -
Multiple InstructorsLiveOD
OWASP Top 10 with Jim Manico
View Course This product has multiple variants. The options may be chosen on the product page