From the course: Complete Guide to Penetration Testing

Unlock the full course today

Join today to access over 24,700 courses taught by industry experts.

Analyzing BlackEnergy and GreyEnergy

Analyzing BlackEnergy and GreyEnergy

- [Instructor] The BlackEnergy Trojan started life in 2007 as a denial-of-service attack module, and it's been fairly well analyzed now. It uses PHP command and control system accessed through HTTP with a MySQL back-end database for its configuration data. The command and control platforms are often Linux or BSD servers. The BlackEnergy command and control server has an informative help file written in Russian. It uses HTTP basic authentication as a password protection scheme to protect the botnet. Its configuration file enables a high level of customization of the denial-of-service attack, allowing the form of denial-of-service and the packet size and frequency to be configured. Its attacks include ICMP ping flooding, TCP SYN attacks, UDP flooding, HTTP GET request flooding, DNS flooding, and basic binary data flooding. BlackEnergy comes as a kit with a GUI configuration and build tool to make the botnet implants. It doesn't contain its own exploit for delivery, and the build tool…

Contents