Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

LLM Identifies Info Stealer Vector and Extracts IoCs

DEFCONConference via YouTube

Overview

Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Learn how to leverage Large Language Models to analyze information stealer malware campaigns through an innovative approach that examines screenshots captured during infections. Discover how these overlooked "crime scene snapshots" can be transformed into valuable intelligence using LLM technology to identify infection vectors and extract indicators of compromise at scale. Explore the modern infostealer ecosystem that has generated over 30 million stealer logs traded on underground markets in 2024 alone, and understand how cybercriminals use these tools to harvest everything from browser credentials to session tokens. Examine three distinct malware campaigns through detailed breakdowns that reveal the tactics used to deliver malware and deceive victims. Watch live demonstrations showing how to implement LLM-based analysis while learning about the practical challenges and costs involved in scaling this approach. Gain actionable insights into applying LLM technology to extract intelligence from various illicit artifacts and develop a comprehensive understanding of how to track infostealer campaigns effectively in today's cybercrime landscape.

Syllabus

DEF CON 33 - LLM Identifies Info Stealer Vector & Extracts IoCs -Olivier Bilodeau, Estelle Ruellan

Taught by

DEFCONConference

Reviews

Start your review of LLM Identifies Info Stealer Vector and Extracts IoCs

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.