Learn Excel & Financial Modeling the Way Finance Teams Actually Use Them
Learn Python with Generative AI - Self Paced Online
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Learn how to leverage Large Language Models to analyze information stealer malware campaigns through an innovative approach that examines screenshots captured during infections. Discover how these overlooked "crime scene snapshots" can be transformed into valuable intelligence using LLM technology to identify infection vectors and extract indicators of compromise at scale. Explore the modern infostealer ecosystem that has generated over 30 million stealer logs traded on underground markets in 2024 alone, and understand how cybercriminals use these tools to harvest everything from browser credentials to session tokens. Examine three distinct malware campaigns through detailed breakdowns that reveal the tactics used to deliver malware and deceive victims. Watch live demonstrations showing how to implement LLM-based analysis while learning about the practical challenges and costs involved in scaling this approach. Gain actionable insights into applying LLM technology to extract intelligence from various illicit artifacts and develop a comprehensive understanding of how to track infostealer campaigns effectively in today's cybercrime landscape.
Syllabus
DEF CON 33 - LLM Identifies Info Stealer Vector & Extracts IoCs -Olivier Bilodeau, Estelle Ruellan
Taught by
DEFCONConference