Ayo Secu

  • 홈
  • 태그
  • 방명록

command and control (c2) 1

Command and Control (C2)

Command and Control (C2)In the command and control (C2) phase, attackers establish and maintain communication with compromised systems to issue commands, retrieve data, and manage ongoing operations. C2 channels vary widely in sophistication, from simple web-based communications to advanced steganography and encrypted messaging. Here are common C2 techniques, including web service-based C2, remo..

Security Terms/Attack Structure 2025.01.16
  • 분류 전체보기 (144)
    • Security Terms (144)
      • Threat Modeling (5)
      • Attack Structure (14)
      • Exploits (5)
      • Detection (11)
      • Incident Management (6)
      • Digital Forensics (7)
      • Network Security (35)
      • Web Application (22)
      • Cryptography, Authenticatio.. (8)
      • Infrastructure Virtualizati.. (9)
      • OS Implementation and Syste.. (8)
      • Mitigations (10)
      • Malware Reversing (4)

Tag

Detection, infrastructure virtualization, NETWORK SECURITY, Digital Forensics, incident management, cybersecurity, security terms, mitigations, network, forensic, threat modeling, web application, systems, Exploit, Cryptography, attack structure, Authentication, identity, security, os implementation,

Copyright © Kakao Corp. All rights reserved.

티스토리툴바