Offensive Security: C2 - Intro to C2

Поделиться
HTML-код
  • Опубликовано: 14 ноя 2024

Комментарии • 13

  • @bugr33d0_hunter8
    @bugr33d0_hunter8 5 лет назад +3

    Nice. You sounded like ippsec, when you said I digress. Hehe. Thanks. That helped out a lot.

  • @ashishpatil1085
    @ashishpatil1085 5 лет назад +3

    Nice video, please make a series on building a covert c2 with redirectors and all stuff (maybe using metasploit[or armitage], empire or any other c2 server you might find good), really interested and looking forward on this :)

    • @InjectionSec
      @InjectionSec  5 лет назад +2

      Ashish Patil I’ll see what I can do!
      Covert communications will come naturally as we explore different C2s, but going over redirectors will require a bit of extra thought and “finesse” to do in a generic manner. I’ll certainly keep this in mind.

  • @khurramwzd
    @khurramwzd 5 лет назад +3

    First congrats for new job. And I wish i could have more likes. its though a 24 minutes video but the content I learn from these 24 minutes
    is much more worthy for me as a beginner.

  • @khurramwzd
    @khurramwzd 5 лет назад +3

    Thanks

  • @hailstorm1422
    @hailstorm1422 3 года назад

    Great content mate, thanks for sharing the knowledge.

  • @rahulvaswani8866
    @rahulvaswani8866 5 лет назад +2

    Great!!! Video
    Thanks a lot

  • @acunsumageka3949
    @acunsumageka3949 4 года назад +2

    nice videos

  • @blooomr6720
    @blooomr6720 3 года назад

    i'm working on a graduation project the idea is to create a c2 channel through a persistent attack and detect it using network analysis tools any help on what kind of malware i should use to establish a c2 attack ? i read c2 can be done over TCP , DNS , HTTP ! i just want to monitor general traffic and not get specific any tips ?

  • @Megaheropap
    @Megaheropap 2 года назад +1

    So, are c2 and botnet the same thing?

  • @shashinfosec5088
    @shashinfosec5088 Год назад

    Attacking C&C server