Ayo Secu

  • 홈
  • 태그
  • 방명록

command and control (c2) 1

Command and Control (C2)

Command and Control (C2)In the command and control (C2) phase, attackers establish and maintain communication with compromised systems to issue commands, retrieve data, and manage ongoing operations. C2 channels vary widely in sophistication, from simple web-based communications to advanced steganography and encrypted messaging. Here are common C2 techniques, including web service-based C2, remo..

Security Terms/Attack Structure 2025.01.16
이전
1
다음
더보기
  • 분류 전체보기 (144)
    • Security Terms (144)
      • Threat Modeling (5)
      • Attack Structure (14)
      • Exploits (5)
      • Detection (11)
      • Incident Management (6)
      • Digital Forensics (7)
      • Network Security (35)
      • Web Application (22)
      • Cryptography, Authenticatio.. (8)
      • Infrastructure Virtualizati.. (9)
      • OS Implementation and Syste.. (8)
      • Mitigations (10)
      • Malware Reversing (4)

Tag

security terms, forensic, cybersecurity, network, NETWORK SECURITY, mitigations, infrastructure virtualization, security, Detection, attack structure, threat modeling, Exploit, identity, os implementation, Authentication, Digital Forensics, incident management, Cryptography, systems, web application,

Copyright © Kakao Corp. All rights reserved.

티스토리툴바