Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Malicious Contracts

Hack In The Box Security Conference via YouTube

Overview

This course teaches how to create a smart contract with rootkit functionality, allowing for remote control of devices like mobile phones, IOT devices, servers, and PCs. The course explores the anonymity and immutability of smart contracts, demonstrating how they can be used to build an anonymous rootkit C2 infrastructure. The teaching method includes a live demo of a smart contract powered rootkit. The intended audience for this course includes individuals interested in blockchain technology, smart contracts, cybersecurity, and ethical hacking.

Syllabus

Intro
INTRODUCTION
WHAT IS THEREUM
WHAT IS A SMART CONTRACT
WHAT IS A ROOTKIT
ROOTKIT ATTRIBUTION PROBLEMS FOR ATTACKERS
6. USING SMART CONTRACTS FOR ROOTKIT CZ
DEMO

Taught by

Hack In The Box Security Conference

Reviews

Start your review of Malicious Contracts

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.