YoVDO

Malicious Contracts

Offered By: Hack In The Box Security Conference via YouTube

Tags

Hack In The Box Security Conference Courses Cybersecurity Courses Ethical Hacking Courses Immutability Courses Smart Contracts Courses Anonymity Courses

Course Description

Overview

Explore the potential of smart contracts as anonymous rootkit command and control infrastructure in this 29-minute conference talk from Hack In The Box Security Conference. Delve into the immutable and anonymous nature of smart contracts on public blockchains, and discover how these qualities can be exploited to create untraceable malicious infrastructure. Learn about the creation of a smart contract with rootkit functionality, capable of remotely controlling various devices including mobile phones, IoT devices, servers, and PCs. Witness a live demonstration of a smart contract-powered rootkit and understand the implications for botnet control and targeted attacks. Gain insights into the challenges of attribution and the potential scale of such attacks, presented by Christian Papathansiou, an experienced cybersecurity professional and blockchain expert.

Syllabus

Intro
INTRODUCTION
WHAT IS THEREUM
WHAT IS A SMART CONTRACT
WHAT IS A ROOTKIT
ROOTKIT ATTRIBUTION PROBLEMS FOR ATTACKERS
6. USING SMART CONTRACTS FOR ROOTKIT CZ
DEMO


Taught by

Hack In The Box Security Conference

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network