Infosecurity.US

Information Security & Occasional Forays Into Adjacent Realms

  • Web Log

Image Credit: Marc McGil

C2 Hiding

January 09, 2019 by Marc Handelman in Network Protocols, Network Security, Information Security, SSH, C2

Carrie Roberts, writing at the superlative Black Hills Information Security blog, presents, for your bits related pleasure, the hiding of C2 encapsulated by SSH. Today's Must Read.

January 09, 2019 /Marc Handelman
Network Protocols, Network Security, Information Security, SSH, C2
  • Newer
  • Older