Decentralized C2 Using LogDrop - Exploiting Web Server Misconfigurations
Offered By: Ekoparty Security Conference via YouTube
Course Description
Overview
Explore a decentralized Command and Control (C2) technique called LogDrop in this conference talk from eKOPARTY 2023. Learn how to exploit a common web server misconfiguration to establish a C2 channel using publicly accessible access logs. Discover insights from Arturo 'Buanzo' Busleiman, an experienced programmer and cybersecurity expert, as he presents this proof of concept. Gain valuable knowledge about innovative approaches in red team operations and understand the potential security implications of seemingly minor configuration errors.
Syllabus
C2 descentralizado mediante LogDrop - Arturo 'Buanzo' Busleiman // Red Team - eKOPARTY 2023
Taught by
Ekoparty Security Conference
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Proactive Computer Security
University of Colorado System via Coursera Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Hacker101
HackerOne via Independent CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent