Decentralized C2 Using LogDrop - Exploiting Web Server Misconfigurations
Offered By: Ekoparty Security Conference via YouTube
Course Description
Overview
Explore a decentralized Command and Control (C2) technique called LogDrop in this conference talk from eKOPARTY 2023. Learn how to exploit a common web server misconfiguration to establish a C2 channel using publicly accessible access logs. Discover insights from Arturo 'Buanzo' Busleiman, an experienced programmer and cybersecurity expert, as he presents this proof of concept. Gain valuable knowledge about innovative approaches in red team operations and understand the potential security implications of seemingly minor configuration errors.
Syllabus
C2 descentralizado mediante LogDrop - Arturo 'Buanzo' Busleiman // Red Team - eKOPARTY 2023
Taught by
Ekoparty Security Conference
Related Courses
Offensive Security EngineeringUdemy Python for Command-and-control, Exfiltration and Impact
Infosec via Coursera Command and Control with Merlin
Pluralsight Command and Control with PoshC2
Pluralsight IoT Learning Plan
Amazon Web Services via AWS Skill Builder