99 Reasons Your Perimeter Is Leaking - Evolution of CC
Offered By: YouTube
Course Description
Overview
Syllabus
Intro
Hi, I'm John
Command and Control
Capability
A Brief History of C2
Capabilities Bind Shell - Reverse Shell
Constraints Reverse Shell
Capabilities Shells - IRC
Constraints IRC Channels
Other Protocol Tunneling?
DNS Tunneling
Domain Fronting
Apps / 3rd Party Services
Increasing Red Team Capabilities
Needs - Reliability
Needs - Concealment
Needs - Resilience • Expect messages to be lost, and still operate
Design Decisions
Hyperwave Architecture
Example 1 - Transitivity
Example 2 - Redundancy
Red Team Operational Concerns
C&C Detection Fundamentals
Control Your Attack Surface
Into the App Layer
Ways To Detect...
Unused Services
Process-Traffic Correlation
Unique Domain Activity
Unique URL Path/Params
Headers
Authentication Artifacts
Behavior - API Usage
Behavior - Timing . Our transport polls at X seconds
Payload Patterns
10. General Behavior
Detecting Abuse of: Dropbox
Blue Team Questions
Unit Testing
PC2
Questions?
Related Courses
Security Event Triage: Detecting Network Anomalies with Behavioral AnalysisPluralsight Big Dark Data - Federico Charosky, Quorum Cyber - Update
The Cyber Academy via YouTube Big Dark Data - Federico Charosky, Quorum Cyber
The Cyber Academy via YouTube Responding to the Ever Evolving Threat Landscape - DefCamp - 2021
DefCamp via YouTube DNS Tunnelling - It's All in the Name!
Security BSides London via YouTube