Decentralized C2 Using LogDrop - Exploiting Web Server Misconfigurations
Ekoparty Security Conference via YouTube
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a decentralized Command and Control (C2) technique called LogDrop in this conference talk from eKOPARTY 2023. Learn how to exploit a common web server misconfiguration to establish a C2 channel using publicly accessible access logs. Discover insights from Arturo 'Buanzo' Busleiman, an experienced programmer and cybersecurity expert, as he presents this proof of concept. Gain valuable knowledge about innovative approaches in red team operations and understand the potential security implications of seemingly minor configuration errors.
Syllabus
C2 descentralizado mediante LogDrop - Arturo 'Buanzo' Busleiman // Red Team - eKOPARTY 2023
Taught by
Ekoparty Security Conference