Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

AI-Powered Image-Based Command and Control Framework - Utilizing AI Models to Conceal and Extract Commands in C2 Images

Black Hat via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore how generative AI can be weaponized for malicious Command and Control (C2) attacks in this 21-minute Black Hat conference talk. Discover an innovative AI-enhanced C2 framework that leverages machine learning models to generate visually indistinguishable encoded images containing hidden C2 secrets, moving beyond traditional rule-based steganography techniques. Learn how this approach makes detection significantly more challenging for conventional antivirus software by replacing hard-coded decoding logic with legitimate ML models that can be retrained to evade signature-based detection systems. Examine the feasibility and effectiveness of using AI models for both generating and decoding C2 images, while understanding the security implications of this emerging threat vector. Gain insights into how attackers might exploit generative AI capabilities to create more sophisticated and harder-to-detect command and control communications, complete with a live demonstration of the framework's capabilities. Understand the evolution from traditional steganography methods that embed payloads in least significant bytes to AI-powered techniques that present new challenges for cybersecurity professionals and researchers.

Syllabus

Utilizing AI Models to Conceal and Extract Commands in C2 Images

Taught by

Black Hat

Reviews

Start your review of AI-Powered Image-Based Command and Control Framework - Utilizing AI Models to Conceal and Extract Commands in C2 Images

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.