Overview
This course teaches how to create a smart contract with rootkit functionality, allowing for remote control of devices like mobile phones, IOT devices, servers, and PCs. The course explores the anonymity and immutability of smart contracts, demonstrating how they can be used to build an anonymous rootkit C2 infrastructure. The teaching method includes a live demo of a smart contract powered rootkit. The intended audience for this course includes individuals interested in blockchain technology, smart contracts, cybersecurity, and ethical hacking.
Syllabus
Intro
INTRODUCTION
WHAT IS THEREUM
WHAT IS A SMART CONTRACT
WHAT IS A ROOTKIT
ROOTKIT ATTRIBUTION PROBLEMS FOR ATTACKERS
6. USING SMART CONTRACTS FOR ROOTKIT CZ
DEMO
Taught by
Hack In The Box Security Conference