YoVDO

Decentralized C2 Using LogDrop - Exploiting Web Server Misconfigurations

Offered By: Ekoparty Security Conference via YouTube

Tags

Command and Control Courses Cybersecurity Courses Network Security Courses Penetration Testing Courses Web Server Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a decentralized Command and Control (C2) technique called LogDrop in this conference talk from eKOPARTY 2023. Learn how to exploit a common web server misconfiguration to establish a C2 channel using publicly accessible access logs. Discover insights from Arturo 'Buanzo' Busleiman, an experienced programmer and cybersecurity expert, as he presents this proof of concept. Gain valuable knowledge about innovative approaches in red team operations and understand the potential security implications of seemingly minor configuration errors.

Syllabus

C2 descentralizado mediante LogDrop - Arturo 'Buanzo' Busleiman // Red Team - eKOPARTY 2023


Taught by

Ekoparty Security Conference

Related Courses

Network Security
Georgia Institute of Technology via Udacity
Proactive Computer Security
University of Colorado System via Coursera
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera
Hacker101
HackerOne via Independent
CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent