ABSTRACT

In this chapter, the author goes over the process of using other attack tools in the penetration of the network. Poison Ivy is a free remote administration tool that allows hackers to command and control Windows operating systems. It allows a hacker to create a small executable of roughly 7 KB, which acts as a server to command and control a system. The Poison Ivy tool itself allows the hacker to interact with the server and control the victim. Like Poison Ivy, Shark relies on the hacker uploading Shark's executable to a victim, therefore the hacker has to initially generate the malware within Shark for it to command and control back to the host running the Shark client. Poison Ivy and Shark are advanced attack tools that the hacker can use for further penetration of the network. Using these tools aids in commanding and controlling multiple hosts, and helps in deeper infiltration into the network.