Semester of Graduation

Fall

Degree

Master of Science (MS)

Department

Computer Science and Engineering

Document Type

Thesis

Abstract

The client-server model forms a core part of any existing network infrastructure. This interdependence between multiple client-server information systems means more vulnerabilities are open to exploitation. Once attackers gain control of an existing server, they can explore the vulnerabilities of a server system. To provide a more effective manner of defending against this type of persistent attack, this thesis aims to provide core information for understanding how post-exploitation of client-server systems works and an example attack scenario of a compromised system's behavior.

In this thesis, we identify several mechanisms used to control the attack flow and evade detection in the post-exploitation phase. Then, we enumerate recent malware using command and control (C2) mechanisms for conducting their attacks. Using lessons from malware like LummaC2 and the SolarWinds attack, we construct an attack scenario on a server system hosting a game service. Then, we investigate the details of the underlying service necessary to showcase the effect of the payload of the attack. After the scenario's conclusion, we show some ways to analyze the behavior of the attacker's C2 framework.

Date

10-30-2024

Committee Chair

Gerald Baumgartner

Share

COinS