YoVDO

CommandGPT: Using ChatGPT for C2 and Post-Exploitation - Lecture 13

Offered By: BruCON Security Conference via YouTube

Tags

Cybersecurity Courses ChatGPT Courses Ransomware Courses Code Generation Courses Operational Security Courses Offensive Security Courses Post Exploitation Courses Command and Control Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the innovative use of ChatGPT in command and control frameworks and post-exploitation techniques in this conference talk from BruCON Security Conference. Discover how CommandGPT eliminates the need for manual coding by generating on-the-fly code snippets for various post-exploitation tasks. Begin with an overview of GPT applications in offensive security before delving into the implant's core functionalities and its ability to evade endpoint defenses. Witness a simulation of common ransomware techniques and examine potential improvements in operational security. Conclude by discussing the limitations that may affect the implant's suitability for production environments. This 40-minute presentation offers valuable insights into the intersection of AI and cybersecurity, showcasing both the potential and challenges of leveraging language models in offensive security operations.

Syllabus

13 - BruCON 0x0F - CommandGPT – Using ChatGPT for C2 and Post-Exploitation - Jonas Bauters


Taught by

BruCON Security Conference

Related Courses

AI Foundations: Prompt Engineering with ChatGPT
Arizona State University via Coursera
AI para docentes: Transforma tu enseñanza con ChatGPT
Universidad Anáhuac via Coursera
Intro to AI for Digital Marketing
Davidson College via edX
AI Prompt Engineering for Beginners
Davidson College via edX
Herramientas de Inteligencia Artificial para la productividad. Más allá del ChatGPT
Universitat Politècnica de València via edX