Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Victim Machine has Joined General Using Third Party APIs as CC Infrastructure

via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore how third-party APIs can be exploited as command and control infrastructure in this eye-opening conference talk from Derbycon 7. Delve into the innovative techniques presented by Stephen Hilt Lord, demonstrating how attackers can leverage seemingly innocuous services to establish covert communication channels with compromised systems. Gain valuable insights into this emerging threat vector and learn about potential defensive strategies to protect against such sophisticated attack methodologies.

Syllabus

T115 Victim Machine has joined general Using Third Party APIs as CC Infrastructure Stephen Hilt Lord

Reviews

Start your review of Victim Machine has Joined General Using Third Party APIs as CC Infrastructure

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.