This investigation reveals how to detect vulnerabilities and configuration flaws in the distant C&C panels and exploit them by next the path of penetration testing. This talk is derived from the serious time analysis in which numerous C&C panels have been targeted and intelligence was collected to attack the following established of C&C panels.