Free YouTube views likes and subscribers? Easily!
Get Free YouTube Subscribers, Views and Likes

Hacking the Hackers: The Art of Compromising C2 Servers with Vangelis Stykas

Follow
The Security Repo

In this episode of the Security Repo podcast, we take a dive into the intriguing world of hacking the hackers with Vangelis Stykas. Stykas, a notable figure in cybersecurity, shares his experiences and methodologies for compromising C2 servers—central nodes used by hackers to control malware. He reveals how simple web application vulnerabilities can lead to significant breaches in the security of these servers. The discussion also covers the ethical and legal nuances of Stykas' work, including the challenges and risks involved in targeting these digital underworld operatives. Additionally, Stykas touches on his professional journey, including his role as the CTO of Atropos, a company specializing in web application and API security. This episode promises to uncover key discoveries about the shadowy aspects of cybersecurity and the ongoing battle between hackers and those who hack them.

Show Notes:
Atropos https://atropos.ai/
Stalking the Stakers Blog Post https://atropos.ai/stalkingthestalk...

DefCon Talk    • DEF CON 31  The Art of Compromising ...  

Social Media
X.com   / evstykas  
Linkedin   / vangelisstykas  

Breakdown
0:00 Intro
1:20 What are C2 Server
2:05 Why target C2 Servers
4:00 Research Methodology
9:51 How vulnerable are malware servers
12:15 How to hack C2 servers
15:04 The problem targeting C2s
18:00 The Hackers Strike Back
19:05 What is the impact?
20:40 State of C2 Security now
21:37 Criminals and Bug Bounties
23:32 Sponsors Segment
24:19 Is this legal?
28:27 Atropos Pentesting plus API security
28:50 Whats Next
31:09 Best advice and Worst Advice for Security
33:00 Wrap Up

posted by pohodiliav