"The Art of Compromising C2 Servers: A Web Application Vulnerabilities Perspective" Vangelis Stykas

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • number6
    404 Image not found
    • Apr 2019
    • 2172

    #1

    "The Art of Compromising C2 Servers: A Web Application Vulnerabilities Perspective" Vangelis Stykas

    The Art of Compromising C2 Servers: A Web Application Vulnerabilities Perspective
    Vangelis Stykas, CTO at Tremau, He/Him
    Exploit
    45 Minutes

    C2 servers of mobile and Windows malware are usually left to their own fate after they have been discovered and the malware is no longer effective. We are going to take a deep dive into the rabbit hole of attacking and owning C2 servers, exposing details about their infrastructure, code bases, and the identity of the companies and individuals that operate and profit from them.

    While understanding and reversing malware is a highly skilled procedure, attacking the C2 itself rarely requires a lot of technical skills. Most of the C2 servers have the same typical HTTP problems that can be detected by off-the-shelf vulnerability scanners.
    By exploiting low-hanging fruit vulnerabilities, an attacker can obtain unauthorized access to administrative functions, allowing them to command thousands of devices and further explore other attack vectors. This can give them access to administrator panels and malware source code, and result in the identity of threat actors being exposed.

    Vangelis is a software developer, penetration tester, and PhD candidate.He applies his skills at his job as Chief Technology Officer at Tremau and his research focus revolves around API and web application security. His academic research is focused on machine learning in web application security and the development of proactive web application security. During his free time, Vangelis is helping start-ups secure themselves on the Internet and get a leg up in security terms. During the past years he has published and presented research regarding API control functions for ships, smart locks, IP cameras, EV chargers and many other IoT devices. He has performed extensive research on the stakerware industry.

    https://twitter.com/evstykas
    https://stykas.com

    REFERENCES:

    Harly malware: https://www.kaspersky.com/blog/harly...scriber/45573/
    Clipper malware: https://www.welivesecurity.com/2023/...rency-wallets/
    Nexus malware: https://www.techrepublic.com/article...nance-targets/
    Aurora malware: https://www.bleepingcomputer.com/new...by-cybergangs/
Working...