YoVDO

CommandGPT: Using ChatGPT for C2 and Post-Exploitation - Lecture 13

Offered By: BruCON Security Conference via YouTube

Tags

Cybersecurity Courses ChatGPT Courses Ransomware Courses Code Generation Courses Operational Security Courses Offensive Security Courses Post Exploitation Courses Command and Control Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the innovative use of ChatGPT in command and control frameworks and post-exploitation techniques in this conference talk from BruCON Security Conference. Discover how CommandGPT eliminates the need for manual coding by generating on-the-fly code snippets for various post-exploitation tasks. Begin with an overview of GPT applications in offensive security before delving into the implant's core functionalities and its ability to evade endpoint defenses. Witness a simulation of common ransomware techniques and examine potential improvements in operational security. Conclude by discussing the limitations that may affect the implant's suitability for production environments. This 40-minute presentation offers valuable insights into the intersection of AI and cybersecurity, showcasing both the potential and challenges of leveraging language models in offensive security operations.

Syllabus

13 - BruCON 0x0F - CommandGPT – Using ChatGPT for C2 and Post-Exploitation - Jonas Bauters


Taught by

BruCON Security Conference

Related Courses

Cyber Security Foundations: Common Malware Attacks and Defense Strategies
EC-Council via FutureLearn
Cybersecurity Foundations
LinkedIn Learning
The Cybersecurity Threat Landscape
LinkedIn Learning
A Guide to Ransomware Protection
Udemy
Ciberseguridad. Bases y estructuras para la protección de la información
Universidad Anáhuac via edX