Free AI-powered learning to build in-demand skills
PowerBI Data Analyst - Create visualizations and dashboards from scratch
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore how generative AI can be weaponized for malicious Command and Control (C2) attacks in this 21-minute Black Hat conference talk. Discover an innovative AI-enhanced C2 framework that leverages machine learning models to generate visually indistinguishable encoded images containing hidden C2 secrets, moving beyond traditional rule-based steganography techniques. Learn how this approach makes detection significantly more challenging for conventional antivirus software by replacing hard-coded decoding logic with legitimate ML models that can be retrained to evade signature-based detection systems. Examine the feasibility and effectiveness of using AI models for both generating and decoding C2 images, while understanding the security implications of this emerging threat vector. Gain insights into how attackers might exploit generative AI capabilities to create more sophisticated and harder-to-detect command and control communications, complete with a live demonstration of the framework's capabilities. Understand the evolution from traditional steganography methods that embed payloads in least significant bytes to AI-powered techniques that present new challenges for cybersecurity professionals and researchers.
Syllabus
Utilizing AI Models to Conceal and Extract Commands in C2 Images
Taught by
Black Hat