Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a groundbreaking DEF CON 32 conference talk that reveals how NFTs can be weaponized as attack vectors for command and control operations. Learn about a novel approach to system fingerprinting, data exfiltration, encryption, and remote command execution using blockchain-backed NFT assets that resist takedown attempts. Discover "mFT," an open-source tool that automates malicious payload creation, and see demonstrations of harmless NFTs that showcase this innovative attack vector. Building on the concept that "Everything is a C2 if you're brave enough," understand how to establish an "immortal" C2 Server for under $10 in Ethereum, providing a comprehensive look at the intersection of blockchain technology and cybersecurity vulnerabilities.