Hacking the Hackers: The Art of Compromising C2 Servers with Vangelis Stykas

แชร์
ฝัง
  • เผยแพร่เมื่อ 11 ก.ค. 2024
  • In this episode of the Security Repo podcast, we take a dive into the intriguing world of hacking the hackers with Vangelis Stykas. Stykas, a notable figure in cybersecurity, shares his experiences and methodologies for compromising C2 servers-central nodes used by hackers to control malware. He reveals how simple web application vulnerabilities can lead to significant breaches in the security of these servers. The discussion also covers the ethical and legal nuances of Stykas' work, including the challenges and risks involved in targeting these digital underworld operatives. Additionally, Stykas touches on his professional journey, including his role as the CTO of Atropos, a company specializing in web application and API security. This episode promises to uncover key discoveries about the shadowy aspects of cybersecurity and the ongoing battle between hackers and those who hack them.
    Show Notes:
    Atropos - atropos.ai/
    Stalking the Stakers Blog Post - atropos.ai/stalking-the-stalk...
    DefCon Talk - • DEF CON 31 - The Art o...
    Social Media
    X.com - / evstykas
    Linkedin - / vangelis-stykas
    Breakdown
    0:00 Intro
    1:20 What are C2 Server
    2:05 Why target C2 Servers
    4:00 Research Methodology
    9:51 How vulnerable are malware servers
    12:15 How to hack C2 servers
    15:04 The problem targeting C2s
    18:00 The Hackers Strike Back
    19:05 What is the impact?
    20:40 State of C2 Security now
    21:37 Criminals and Bug Bounties
    23:32 Sponsors Segment
    24:19 Is this legal?
    28:27 Atropos - Pentesting plus API security
    28:50 Whats Next
    31:09 Best advice and Worst Advice for Security
    33:00 Wrap Up

ความคิดเห็น • 4

  • @sekytwo
    @sekytwo 14 วันที่ผ่านมา

    Awesome interview bro!