September 2018
Intermediate to advanced
480 pages
9h 45m
English
Before getting into the details of all the options used in this tool, let's first take a look at the terminologies of the tool:
The compromised system that connects back to the Koadic Command and Control Server. Just like a session is opened in Metasploit, a zombie will connect back to Koadic.
The Command and Control web server from where the payload and implants are fetched by the zombie. Stagers are also used to maintain the connection between the zombies and Koadic. Note that Koadic does not rely on TCP connections for continues communication. Instead, the connection is maintained by requesting multiple HTTP connections.
An implant is a JavaScript or a VBScript code, which is executed by zombies ...