Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the potential of smart contracts as anonymous rootkit command and control infrastructure in this 29-minute conference talk from Hack In The Box Security Conference. Delve into the immutable and anonymous nature of smart contracts on public blockchains, and discover how these qualities can be exploited to create untraceable malicious infrastructure. Learn about the creation of a smart contract with rootkit functionality, capable of remotely controlling various devices including mobile phones, IoT devices, servers, and PCs. Witness a live demonstration of a smart contract-powered rootkit and understand the implications for botnet control and targeted attacks. Gain insights into the challenges of attribution and the potential scale of such attacks, presented by Christian Papathansiou, an experienced cybersecurity professional and blockchain expert.
Syllabus
Intro
INTRODUCTION
WHAT IS THEREUM
WHAT IS A SMART CONTRACT
WHAT IS A ROOTKIT
ROOTKIT ATTRIBUTION PROBLEMS FOR ATTACKERS
6. USING SMART CONTRACTS FOR ROOTKIT CZ
DEMO
Taught by
Hack In The Box Security Conference