Understanding C2 Beacons - Part 2 of 2 | Malware of the Day

Поділитися
Вставка
  • Опубліковано 17 жов 2024
  • A video summary by Faan Rossouw of the Malware of the Day - Understanding C2 Beacons - Part 2 of 2
    🔗 Blog post located here: www.activecoun...
    🔗 AC-Hunter:
    www.activecoun...
    🔗 AC-Hunter Community Edition: www.activecoun...
    🔗 Register for webcasts, summits, and workshops -
    poweredbybhis.com
    🔗 RITA on GitHub:
    github.com/act...
    🔗 Interactive Demo Space -
    www.activecoun...
    Timeline:
    00:06 - Introduction
    01:53 - Quick recap
    04:08 - Base histogram
    06:12 - Decreased delay
    06:55 - Increased delay
    08:57 - Decreased jitter
    10:22 - Increased jitter
    11:17 - No jitter
    14:26 - Round robin host rotation strategy
    15:26 - Random host rotation strategy
    16:52 - Conclusion
    ///Active Countermeasures Open-Source Tools
    www.activecoun...
    ///Active Countermeasures Socials
    Twitter: / activecmeasures
    LinkedIn: / active-countermeasures
    Discord: / discord
    Educational Threat Hunting Content
    FREE 6-Hour Threat Hunt Training: www.activecoun...
    Active Countermeasures Blog: www.activecoun...
    Active Countermeasures UA-cam: / activecountermeasures
    Learn Threat Hunting Skills from Antisyphon Training
    Entry-Level (Pay-What-You-Can): www.antisyphon...
    Advanced: www.antisyphon...
    Active Countermeasures Shirts
    spearphish-gen...
    Our Tribe
    Black Hills Infosec: www.blackhills...
    Wld West Hackin' Fest: wildwesthackin...
    Antisyphon Training: www.antisyphon...

КОМЕНТАРІ •