Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

The Art of Compromising Command and Control Servers - A Web Application Vulnerabilities Perspective

DEFCONConference via YouTube

Overview

Explore a comprehensive DEF CON 31 conference talk that delves into the vulnerabilities of Command and Control (C2) servers used by mobile and Windows malware. Learn how these servers, often abandoned after malware discovery, can be compromised through common web application vulnerabilities rather than complex technical exploits. Discover techniques for gaining unauthorized administrative access, controlling infected devices, and exposing threat actors' infrastructure and identities. Understand how basic HTTP vulnerabilities, detectable by standard security tools, can lead to significant breaches in malware operations, providing access to admin panels, source code, and operator information. Master the methodology of targeting these servers to uncover valuable intelligence about malware operations and the individuals profiting from them.

Syllabus

DEF CON 31 - The Art of Compromising C2 Servers A Web App Vulns Perspective - Vangelis Stykas

Taught by

DEFCONConference

Reviews

Start your review of The Art of Compromising Command and Control Servers - A Web Application Vulnerabilities Perspective

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.