Back to Browse

Attack Detection Fundamentals: Workshop #4 - C2 and Exfiltration

3.7K views
Jul 16, 2020
41:11

Jordan LaRose and Derek Stoeckenius conclude the series with a workshop on C2/C3 and exfiltration. In this workshop: - Learn about commonly-used Command and Control (C2) channels including HTTP and DNS.  - Make use of open-source tools to detect C2 traffic.  - Explore how threat actors use legitimate services, like Dropbox, to hide C2 traffic, through demonstrations with F-Secure's C3 framework. You can find the workshop guides over on the F-Secure Labs website: Lab guide 1: https://labs.f-secure.com/blog/attack-detection-fundamentals-c2-and-exfiltration-lab-1 Lab guide 2: https://labs.f-secure.com/blog/attack-detection-fundamentals-c2-and-exfiltration-lab-2 Lab guide 3: https://labs.f-secure.com/blog/attack-detection-fundamentals-c2-and-exfiltration-lab-3

Download

0 formats

No download links available.

Attack Detection Fundamentals: Workshop #4 - C2 and Exfiltration | NatokHD