Hacking the Hackers: The Art of Compromising C2 Servers with Vangelis Stykas

  Рет қаралды 5,637

The Security Repo

The Security Repo

Күн бұрын

Пікірлер: 11
@etziowingeler3173
@etziowingeler3173 23 күн бұрын
Awesome Interview, great job
@Z3kyTw0
@Z3kyTw0 4 ай бұрын
Awesome interview bro!
@gordona.freidman7308
@gordona.freidman7308 Ай бұрын
Encrypted payloads unravel as hackers get caught in their own exploits. Firewalls glitch, systems crash-who's hacking who now?
@brettharter143
@brettharter143 2 ай бұрын
These interviewers have no idea lol 'How much malware is connecting to a c2 server' This isnt the 90s kid
@xxXsnarkysparkyXxx
@xxXsnarkysparkyXxx Ай бұрын
the fuck does this even mean?
@brettharter143
@brettharter143 Ай бұрын
@DigitalChaosClub malware used to just destroy peoples PCs in the 90s it rarely had a network connection and its only purpose was causing a nuisance. Now days malware ALWAYS polls to the internet to connect back to an attacker. Even ransomware polls.
@davidkamaunu8734
@davidkamaunu8734 6 күн бұрын
OK thanks Trinity...
From Bank Heists to Security Insights: The Jayson E. Street Story
55:20
The Security Repo
Рет қаралды 1,1 М.
World’s strongest WOMAN vs regular GIRLS
00:56
A4
Рет қаралды 48 МЛН
Молодой боец приземлил легенду!
01:02
МИНУС БАЛЛ
Рет қаралды 1,7 МЛН
HELP!!!
00:46
Natan por Aí
Рет қаралды 75 МЛН
Tex: How to wrap text in LaTeX tables with multirow
4:17
Peter Schneider
Рет қаралды 1
The Evolution of Offensive Security with Erik Cabetas
41:42
The Security Repo
Рет қаралды 488
Hacking Windows TrustedInstaller (GOD MODE)
31:07
John Hammond
Рет қаралды 734 М.
Self-Extracting Executables for Hackers
41:06
John Hammond
Рет қаралды 87 М.
this new Linux feature makes hacking IMPOSSIBLE
11:08
Low Level
Рет қаралды 471 М.