Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Malicious Contracts

Hack In The Box Security Conference via YouTube

Overview

Explore the potential of smart contracts as anonymous rootkit command and control infrastructure in this 29-minute conference talk from Hack In The Box Security Conference. Delve into the immutable and anonymous nature of smart contracts on public blockchains, and discover how these qualities can be exploited to create untraceable malicious infrastructure. Learn about the creation of a smart contract with rootkit functionality, capable of remotely controlling various devices including mobile phones, IoT devices, servers, and PCs. Witness a live demonstration of a smart contract-powered rootkit and understand the implications for botnet control and targeted attacks. Gain insights into the challenges of attribution and the potential scale of such attacks, presented by Christian Papathansiou, an experienced cybersecurity professional and blockchain expert.

Syllabus

Intro
INTRODUCTION
WHAT IS THEREUM
WHAT IS A SMART CONTRACT
WHAT IS A ROOTKIT
ROOTKIT ATTRIBUTION PROBLEMS FOR ATTACKERS
6. USING SMART CONTRACTS FOR ROOTKIT CZ
DEMO

Taught by

Hack In The Box Security Conference

Reviews

Start your review of Malicious Contracts

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.