Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore offensive cybersecurity strategies for infiltrating and disrupting ransomware group operations in this DEF CON 32 conference presentation. Learn methodologies for targeting and exploiting vulnerabilities in ransomware web panels and APIs used during data exfiltration. Discover techniques for gaining unauthorized access to command and control centers, gathering intelligence on threat actors, and potentially identifying APT operators. Gain insights into turning defense into offense by targeting the infrastructure ransomware groups depend on for managing their malicious activities, ultimately disrupting their ability to conduct attacks and cause widespread damage across sectors.