DEF CON 31 - The Art of Compromising C2 Servers A Web App Vulns Perspective - Vangelis Stykas

  Рет қаралды 11,008

DEFCONConference

DEFCONConference

8 ай бұрын

C2 servers of mobile and Windows malware are usually left to their own fate after they have been discovered and the malware is no longer effective. We are going to take a deep dive into the rabbit hole of attacking and owning C2 servers, exposing details about their infrastructure, code bases, and the identity of the companies and individuals that operate and profit from them.
While understanding and reversing malware is a highly skilled procedure, attacking the C2 itself rarely requires a lot of technical skills. Most of the C2 servers have the same typical HTTP problems that can be detected by off-the-shelf vulnerability scanners.
By exploiting low-hanging fruit vulnerabilities, an attacker can obtain unauthorized access to administrative functions, allowing them to command thousands of devices and further explore other attack vectors. This can give them access to administrator panels and malware source code, and result in the identity of threat actors being exposed.

Пікірлер: 14
@majdps995
@majdps995 7 ай бұрын
Great talk! Pawning C2s is something that I wanted to test a long time ago but was lazy to do it. Many C2s that are made by none state sponsored criminals are of mid-low quality and does not follow any best practices at all. It is because they put most of the work in their malware itself and most of that work comprises of copying and pasting code from other sources, even if they don't understand what the code does. Very few out there that really take care of their opsec and the security of their malware. I would say that many C2s have become better than before in terms of security, and this is due to the adoption of web frameworks such as laravel and django. However, as demonstrated in the video, they still have bad security because of bad practices.
@fiendlybrds
@fiendlybrds 8 ай бұрын
2x speed, this is a great talk.
@anastasiszaro
@anastasiszaro 8 ай бұрын
typical Greek speaking English xD Bonus: if you're Greek in Thessaloniki then you also have the same speed when speaking Greek
@LasArmas_
@LasArmas_ 8 ай бұрын
Thank you from an Anxrquista
@deeglik
@deeglik 8 ай бұрын
Brilliant Talk!!!!
@iwuvu5940
@iwuvu5940 8 ай бұрын
Keep uploading these videos, people like me actually listen to these to learn stuff about hacking
@MrMitchell699
@MrMitchell699 8 ай бұрын
So why didn't he hit the delete all button?
@TheCramik
@TheCramik 8 ай бұрын
because they would rebuild on different servers, patch issues, etc. The longterm effects of leaving cronjobs that only delete small portions and backdoors is likely to be more significant
@MFoster392
@MFoster392 8 ай бұрын
Great talk STÖK
@andrewferguson6901
@andrewferguson6901 8 ай бұрын
Here, for you to copy paste, ö Ö
@MFoster392
@MFoster392 8 ай бұрын
@@andrewferguson6901 Thanks man :)
@LasArmas_
@LasArmas_ 8 ай бұрын
Working together we can do better
@azharshah316
@azharshah316 8 ай бұрын
If you dont know what a botnet is ..................... 😁
A Worlds First On This Top Tier Radio - TIDRadio H3
11:52
Tech Minds
Рет қаралды 7 М.
ХОТЯ БЫ КИНОДА 2 - официальный фильм
1:35:34
ХОТЯ БЫ В КИНО
Рет қаралды 2,2 МЛН
ISSEI funny story😂😂😂Strange World | Magic Lips💋
00:36
ISSEI / いっせい
Рет қаралды 187 МЛН
3 Things They Don’t Tell You About Tankless
5:56
Matt Risinger
Рет қаралды 2,6 МЛН
DEF CON 31 - Physical Attacks Against Smartphones - Christopher Wade
37:01
DEF CON 31 - Defeating VPN Always On - Maxime Clementz
40:07
DEFCONConference
Рет қаралды 12 М.
How to make, dimple lock picks at home.
7:43
Rook Knight
Рет қаралды 8 М.
С Какой Высоты Разобьётся NOKIA3310 ?!😳
0:43
⌨️ Сколько всего у меня клавиатур? #обзор
0:41
Гранатка — про VR и девайсы
Рет қаралды 646 М.
Индуктивность и дроссель.
1:00
Hi Dev! – Электроника
Рет қаралды 1,5 МЛН