CommandGPT: Using ChatGPT for C2 and Post-Exploitation - Lecture 13
Offered By: BruCON Security Conference via YouTube
Course Description
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the innovative use of ChatGPT in command and control frameworks and post-exploitation techniques in this conference talk from BruCON Security Conference. Discover how CommandGPT eliminates the need for manual coding by generating on-the-fly code snippets for various post-exploitation tasks. Begin with an overview of GPT applications in offensive security before delving into the implant's core functionalities and its ability to evade endpoint defenses. Witness a simulation of common ransomware techniques and examine potential improvements in operational security. Conclude by discussing the limitations that may affect the implant's suitability for production environments. This 40-minute presentation offers valuable insights into the intersection of AI and cybersecurity, showcasing both the potential and challenges of leveraging language models in offensive security operations.
Syllabus
13 - BruCON 0x0F - CommandGPT – Using ChatGPT for C2 and Post-Exploitation - Jonas Bauters
Taught by
BruCON Security Conference
Related Courses
AI Foundations: Prompt Engineering with ChatGPTArizona State University via Coursera AI para docentes: Transforma tu enseñanza con ChatGPT
Universidad Anáhuac via Coursera Intro to AI for Digital Marketing
Davidson College via edX AI Prompt Engineering for Beginners
Davidson College via edX Herramientas de Inteligencia Artificial para la productividad. Más allá del ChatGPT
Universitat Politècnica de València via edX