Тёмный
No video :(

DEF CON 31 - The Art of Compromising C2 Servers A Web App Vulns Perspective - Vangelis Stykas 

DEFCONConference
Подписаться 293 тыс.
Просмотров 12 тыс.
50% 1

C2 servers of mobile and Windows malware are usually left to their own fate after they have been discovered and the malware is no longer effective. We are going to take a deep dive into the rabbit hole of attacking and owning C2 servers, exposing details about their infrastructure, code bases, and the identity of the companies and individuals that operate and profit from them.
While understanding and reversing malware is a highly skilled procedure, attacking the C2 itself rarely requires a lot of technical skills. Most of the C2 servers have the same typical HTTP problems that can be detected by off-the-shelf vulnerability scanners.
By exploiting low-hanging fruit vulnerabilities, an attacker can obtain unauthorized access to administrative functions, allowing them to command thousands of devices and further explore other attack vectors. This can give them access to administrator panels and malware source code, and result in the identity of threat actors being exposed.

Опубликовано:

 

28 авг 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 14   
@majdps995
@majdps995 11 месяцев назад
Great talk! Pawning C2s is something that I wanted to test a long time ago but was lazy to do it. Many C2s that are made by none state sponsored criminals are of mid-low quality and does not follow any best practices at all. It is because they put most of the work in their malware itself and most of that work comprises of copying and pasting code from other sources, even if they don't understand what the code does. Very few out there that really take care of their opsec and the security of their malware. I would say that many C2s have become better than before in terms of security, and this is due to the adoption of web frameworks such as laravel and django. However, as demonstrated in the video, they still have bad security because of bad practices.
@fiendlybrds
@fiendlybrds 11 месяцев назад
2x speed, this is a great talk.
@anastasiszaro
@anastasiszaro 11 месяцев назад
typical Greek speaking English xD Bonus: if you're Greek in Thessaloniki then you also have the same speed when speaking Greek
@iwuvu5940
@iwuvu5940 11 месяцев назад
Keep uploading these videos, people like me actually listen to these to learn stuff about hacking
@LasArmas_
@LasArmas_ 11 месяцев назад
Thank you from an Anxrquista
@deeglik
@deeglik 11 месяцев назад
Brilliant Talk!!!!
@MFoster392
@MFoster392 11 месяцев назад
Great talk STÖK
@andrewferguson6901
@andrewferguson6901 11 месяцев назад
Here, for you to copy paste, ö Ö
@MFoster392
@MFoster392 11 месяцев назад
@@andrewferguson6901 Thanks man :)
@MrMitchell699
@MrMitchell699 11 месяцев назад
So why didn't he hit the delete all button?
@TheCramik
@TheCramik 11 месяцев назад
because they would rebuild on different servers, patch issues, etc. The longterm effects of leaving cronjobs that only delete small portions and backdoors is likely to be more significant
@LasArmas_
@LasArmas_ 11 месяцев назад
Working together we can do better
@azharshah316
@azharshah316 11 месяцев назад
If you dont know what a botnet is ..................... 😁
Далее
А ВЫ УМЕЕТЕ ПЛАВАТЬ?? #shorts
00:21
Просмотров 1,9 млн
DEF CON 31 - Private Keys in Public Places - Tom Pohl
40:06