Inside Command and Control (C2) servers: Unveiling the secrets

Поділитися
Вставка
  • Опубліковано 24 січ 2025

КОМЕНТАРІ • 11

  • @abhinavpandey9761
    @abhinavpandey9761 Рік тому

    This channel deserves at least 100k views and millions of subscribers

  • @rahulove30
    @rahulove30 Рік тому

    Thanks you sir
    If more videos on threat intelligence so please share with us
    Thanku very much prabh sir ji

  • @directoraep
    @directoraep 3 місяці тому

    Best video on C2 Server

  • @minhazrobin8891
    @minhazrobin8891 Рік тому

    Thanks Prabh Sir ... really good explanation

  • @navinreddy-xx1vo
    @navinreddy-xx1vo 10 місяців тому

    Nice explanation, Thanks for video

  • @jvbenjamin
    @jvbenjamin Рік тому

    Hey Prabh - would you recommend this level for detail for CISSP - or is this more relevant to other exams / skills. Thanks in advance.

  • @arijitdas9115
    @arijitdas9115 7 місяців тому

    Reverse tcp connection the attacker made to the victim system and make it to open a port so that outbound issue from the firewall get bypassed.

  • @avinashpaul8023
    @avinashpaul8023 Рік тому

    Bro crowdstike tickets ni Ela investigation chyalii and logs ela understand chesukovaloo chpandiii bro Telugu lo please

  • @opop-sk7os
    @opop-sk7os Рік тому

    sir ji pls pls pls make a proper roadmap for risk managment like biten teck sir

  • @hiddengo3232
    @hiddengo3232 Рік тому

    demo?

  • @suniltalekar5913
    @suniltalekar5913 Рік тому

    Becon