CommandGPT: Using ChatGPT for C2 and Post-Exploitation - Lecture 13
Offered By: BruCON Security Conference via YouTube
Course Description
Overview
Explore the innovative use of ChatGPT in command and control frameworks and post-exploitation techniques in this conference talk from BruCON Security Conference. Discover how CommandGPT eliminates the need for manual coding by generating on-the-fly code snippets for various post-exploitation tasks. Begin with an overview of GPT applications in offensive security before delving into the implant's core functionalities and its ability to evade endpoint defenses. Witness a simulation of common ransomware techniques and examine potential improvements in operational security. Conclude by discussing the limitations that may affect the implant's suitability for production environments. This 40-minute presentation offers valuable insights into the intersection of AI and cybersecurity, showcasing both the potential and challenges of leveraging language models in offensive security operations.
Syllabus
13 - BruCON 0x0F - CommandGPT – Using ChatGPT for C2 and Post-Exploitation - Jonas Bauters
Taught by
BruCON Security Conference
Related Courses
ChatGPT et IA : mode d'emploi pour managers et RHCNAM via France Université Numerique Generating New Recipes using GPT-2
Coursera Project Network via Coursera Deep Learning NLP: Training GPT-2 from scratch
Coursera Project Network via Coursera Data Science A-Z: Hands-On Exercises & ChatGPT Prize [2024]
Udemy Deep Learning A-Z 2024: Neural Networks, AI & ChatGPT Prize
Udemy