A command-and-control (C2) server orchestrates a botnet attack by issuing instructions to compromised devices. The botnet grows autonomously, scanning for and infecting systems with weak Telnet/SSH credentials. Once under control, the infected devices launch large-scale network floods against a target, disrupting services through excessive traffic and resource exhaustion.
MGC Generated
Ground Truth
Ground Truth with Replaced Flooders
Ground Truth with Replaced Telnet Scanner
This attack uses an IRC-based bot to flood a target with massive network traffic, disrupting services. It supports SYN, UDP, HTTP, and ICMP flood attacks, overwhelming servers or networks. The bot operates remotely, receiving commands via an IRC chatroom, allowing attackers to coordinate and launch attacks against chosen targets.
MGC Generated
Ground Truth
This attack creates a secret backdoor using UDP, allowing remote control of a compromised machine. Unlike typical remote access tools, it doesn’t need a constant connection, making it harder to detect. Attackers send commands via UDP packets, and the infected system executes them, sending back responses secretly.
MGC Generated
Ground Truth
This attack targets a SQL injection vulnerability in the PunBB forum software, allowing unauthorized privilege escalation. It begins by logging into a legitimate user account, then injects malicious SQL payloads through the email change functionality to escalate privileges (e.g., granting admin rights). The attack can also intercept or simulate activation keys to finalize the takeover. Once control is gained, it supports optional payload delivery, system persistence, and stealth cleanup—making it suitable for long-term access and lateral movement. Note that the targeted vulnerable version PunBB 1.2.4 is deprecated, and we demo on version 1.2.12 instead.
MGC Generated
Ground Truth
This attack deploys a multi-threaded ransomware payload that encrypts a wide set of file types on a victim’s system using AES encryption. It renames critical system files, drops a ransom note, and displays a custom GUI demanding cryptocurrency payment (Monero). The malware includes evasion logic to detect sandboxes and debugging tools, and uses RSA to securely encrypt the AES keys. The generated variant introduces C2 communication, process injection, persistence, and sandbox detection, making it suitable for longer-term infection and stealth.
MGC Generated
Ground Truth