First congrats for new job. And I wish i could have more likes. its though a 24 minutes video but the content I learn from these 24 minutes is much more worthy for me as a beginner.
Nice video, please make a series on building a covert c2 with redirectors and all stuff (maybe using metasploit[or armitage], empire or any other c2 server you might find good), really interested and looking forward on this :)
Ashish Patil I’ll see what I can do! Covert communications will come naturally as we explore different C2s, but going over redirectors will require a bit of extra thought and “finesse” to do in a generic manner. I’ll certainly keep this in mind.
i'm working on a graduation project the idea is to create a c2 channel through a persistent attack and detect it using network analysis tools any help on what kind of malware i should use to establish a c2 attack ? i read c2 can be done over TCP , DNS , HTTP ! i just want to monitor general traffic and not get specific any tips ?
First congrats for new job. And I wish i could have more likes. its though a 24 minutes video but the content I learn from these 24 minutes
is much more worthy for me as a beginner.
Nice. You sounded like ippsec, when you said I digress. Hehe. Thanks. That helped out a lot.
Nice video, please make a series on building a covert c2 with redirectors and all stuff (maybe using metasploit[or armitage], empire or any other c2 server you might find good), really interested and looking forward on this :)
Ashish Patil I’ll see what I can do!
Covert communications will come naturally as we explore different C2s, but going over redirectors will require a bit of extra thought and “finesse” to do in a generic manner. I’ll certainly keep this in mind.
Thanks
Great content mate, thanks for sharing the knowledge.
Great!!! Video
Thanks a lot
nice videos
i'm working on a graduation project the idea is to create a c2 channel through a persistent attack and detect it using network analysis tools any help on what kind of malware i should use to establish a c2 attack ? i read c2 can be done over TCP , DNS , HTTP ! i just want to monitor general traffic and not get specific any tips ?
So, are c2 and botnet the same thing?
Attacking C&C server