From the course: Ethical Hacking: Denial of Service
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Understanding BlackEnergy
From the course: Ethical Hacking: Denial of Service
Understanding BlackEnergy
- [Instructor] There's been a lot of noise about an incident known as BlackEnergy as a result of attacks on the Ukraine critical infrastructure in 2014 reportedly by Russia. The term BlackEnergy variously refers to a threat actor, a botnet and a piece of malware. Let's have a look at what this really is. A variety of botnets can be used to conduct DDoS attacks, and BlackEnergy is one of the most popular with over 4,000 deployments having been detected. BlackEnergy started out as a web-based distributed denial of service botnet. But in 2008, its authors made significant modifications to the original version, and BlackEnergy 2 is now used for a much wider range of attacks. BlackEnergy is a sophisticated botnet, which consists of a command-and-control server and an implant. It has a number of interesting features: It actively hides from anti-malware products using encryption; it operates by injecting code into system processes; and it can target more than one IP address on a host name…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.