Step 2 – staging the attack

The next step was to begin setting up the real attack tools. Our first step was to create the code to be downloaded, define a communications channel for the remote control, and configure a command-and-control server.

We already knew that the target environment had heavily invested in firewalls and a great IDS, so the communication had to be extremely stealthy. We also knew that they were not using AppLocker or a similar technology to prevent the execution of unknown binaries, since they trusted the perimeter to block any malware, so we decided to use an .exe file as the published inventory tool.

We coded a tool that appeared to actually make an inventory of the workstation, including visual elements such as the ...

Get Learn Social Engineering now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.