CommandGPT: Using ChatGPT for C2 and Post-Exploitation - Lecture 13
Offered By: BruCON Security Conference via YouTube
Course Description
Overview
Explore the innovative use of ChatGPT in command and control frameworks and post-exploitation techniques in this conference talk from BruCON Security Conference. Discover how CommandGPT eliminates the need for manual coding by generating on-the-fly code snippets for various post-exploitation tasks. Begin with an overview of GPT applications in offensive security before delving into the implant's core functionalities and its ability to evade endpoint defenses. Witness a simulation of common ransomware techniques and examine potential improvements in operational security. Conclude by discussing the limitations that may affect the implant's suitability for production environments. This 40-minute presentation offers valuable insights into the intersection of AI and cybersecurity, showcasing both the potential and challenges of leveraging language models in offensive security operations.
Syllabus
13 - BruCON 0x0F - CommandGPT – Using ChatGPT for C2 and Post-Exploitation - Jonas Bauters
Taught by
BruCON Security Conference
Related Courses
CompilersStanford University via Coursera Build a Modern Computer from First Principles: Nand to Tetris Part II (project-centered course)
Hebrew University of Jerusalem via Coursera Разработка веб-сервисов на Go - основы языка
Moscow Institute of Physics and Technology via Coursera Complete Guide to Protocol Buffers 3 [Java, Golang, Python]
Udemy Angular tooling: Generating code with schematics
Coursera Project Network via Coursera