The Art of Lurking: Effective C2 Channels | Corey Overstreet

  Рет қаралды 1,585

Wild West Hackin' Fest

Wild West Hackin' Fest

Күн бұрын

🔗 Join us in-person and virtually at our Wild West Hackin' Fest: information security conferences - wildwesthackin...
🔗 Register for Infosec Webcasts, Anti-casts & Summits. - poweredbybhis.com
Lurking means to wait or move in a secret way so that you cannot be seen. On a red team or assumed breach operation, our success hinges on how our implants communicate with us. The way these communications happen - how fast, how often, and how much data is exchanged - is key to realistically mimicking cyber attackers. In this talk, I'll break down the essentials of choosing a Command and Control (C2) channel and share some clever tactics and commonly used services that help us stay under the radar and gain the upper hand in our target's environment. Get ready for a behind-the-scenes look at the stealthy side of cybersecurity.
///Black Hills Infosec Socials
Twitter: / bhinfosecurity
Mastodon: infosec.exchan...
LinkedIn: / antisyphon-training
Discord: / discord
///Black Hills Infosec Shirts & Hoodies
spearphish-gen...
///Black Hills Infosec Services
Active SOC: www.blackhills...
Penetration Testing: www.blackhills...
Incident Response: www.blackhills...
///Backdoors & Breaches - Incident Response Card Game
Backdoors & Breaches: www.backdoorsa...
Play B&B Online: play.backdoors...
///Antisyphon Training
Pay What You Can: www.antisyphon...
Live Training: www.antisyphon...
On Demand Training: www.antisyphon...
Antisyphon Discord: / discord
Antisyphon Mastodon: infosec.exchan...
///Educational Infosec Content
Black Hills Infosec Blogs: www.blackhills...
Wild West Hackin' Fest KZbin: / wildwesthackinfest
Antisyphon Training KZbin: / antisyphontraining
Active Countermeasures KZbin: / activecountermeasures
Threat Hunter Community Discord: / discord
Join us at the annual information security conference in Deadwood, SD (in-person and virtually) - Wild West Hackin' Fest: wildwesthackin...

Пікірлер: 3
@DeezelxDr3amz
@DeezelxDr3amz 2 күн бұрын
i work as a cybersecurity analyst (level 1 triage) and this guy really rounded a lot of corners for me, greatly valuable information. Awesome stuff.
@ellehooq
@ellehooq Ай бұрын
Interdasting
@QuadDerrick
@QuadDerrick Күн бұрын
your all daft and soft in the head. the good old irc channels \ servers from the 90s, is the perfect control mechanism, still.
When I Grow Up, I Wanna Be a Script Kiddie | John Hammond
37:15
Wild West Hackin' Fest
Рет қаралды 7 М.
Offense for Defense | Tim Medin
42:22
Wild West Hackin' Fest
Рет қаралды 510
So Cute 🥰 who is better?
00:15
dednahype
Рет қаралды 19 МЛН
Гениальное изобретение из обычного стаканчика!
00:31
Лютая физика | Олимпиадная физика
Рет қаралды 4,8 МЛН
Каха и дочка
00:28
К-Media
Рет қаралды 3,4 МЛН
Quando eu quero Sushi (sem desperdiçar) 🍣
00:26
Los Wagners
Рет қаралды 15 МЛН
Introduction to Zeek Log Analysis w/ Troy Wojewoda
59:50
Black Hills Information Security
Рет қаралды 1,8 М.
Never Say Anything: NSA Hacking for Defense at Scale | Tony Sager
48:36
Wild West Hackin' Fest
Рет қаралды 7 М.
Risk Alssessment | Jake Williams
50:44
Wild West Hackin' Fest
Рет қаралды 475
Abusing API Security | Charles Shirer
37:13
Wild West Hackin' Fest
Рет қаралды 1,1 М.
Colossus - The Greatest Secret in the History of Computing
1:00:26
The Centre for Computing History
Рет қаралды 946 М.
So Cute 🥰 who is better?
00:15
dednahype
Рет қаралды 19 МЛН