Infosecurity.US

Information Security & Occasional Forays Into Adjacent Realms

  • Web Log

Image Credit: Marc McGil

C2 Hiding

January 09, 2019 by Marc Handelman in Network Protocols, Network Security, Information Security, SSH, C2

Carrie Roberts, writing at the superlative Black Hills Information Security blog, presents, for your bits related pleasure, the hiding of C2 encapsulated by SSH. Today's Must Read.

January 09, 2019 /Marc Handelman
Network Protocols, Network Security, Information Security, SSH, C2

Command and Control Over ICMP: Chronicles of Red Team C2

December 10, 2018 by Marc Handelman in Information Security, Command and Control, C2, Red Team

Tremendous Red Team related blog post over at Black Hills Infosec, and superbly crafted by Darin Roberts, and detailing How To C2 over ICMP... Enjoy!

December 10, 2018 /Marc Handelman
Information Security, Command and Control, C2, Red Team