7 GitHub Command and Control
Suppose you’ve compromised a machine. Now you want it to automatically perform tasks and report its findings back to you. In this chapter, we’ll create a trojan framework that will appear innocuous on the remote machine, but we’ll be able to assign it all sorts of nefarious tasks.
One of the most challenging aspects of creating a solid trojan framework is figuring out how to control, update, and receive data from your implants. Crucially, you’ll need a relatively universal way to push code to your remote trojans. For one thing, this flexibility will let you perform different tasks on each system. Also, you may ...
Get Black Hat Python, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.