Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Fungible Threats - Exploiting Distributed Data Replication Systems for Malicious Purposes

DEFCONConference via YouTube

Overview

Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Explore how distributed data replication systems can be weaponized for malicious purposes in this 32-minute conference talk from DEF CON 33's Data Duplication Village. Discover how technologies like NFTs, IPFS, Codex, When FS, and Cloudflare R2 buckets extend beyond their intended redundancy functions to become resilient command and control (C2) infrastructures, payload delivery systems, and phishing hosting platforms that effectively challenge traditional takedown efforts. Learn through practical demonstrations how these distributed systems can store and distribute C2 commands, malicious payloads, and comprehensive phishing campaigns including templates and client-side drainers. Gain insights into the evolving landscape of fungible threats and understand how attackers leverage the inherent resilience of distributed data replication to create persistent and difficult-to-eliminate attack infrastructures that exploit the decentralized nature of modern data storage and distribution technologies.

Syllabus

DEF CON 33 - Data Duplication Village - Fungible Threats - Mauro Edritch, Nelson Colon

Taught by

DEFCONConference

Reviews

Start your review of Fungible Threats - Exploiting Distributed Data Replication Systems for Malicious Purposes

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.