TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Black Hills InfoSec

C2, C3, Whatever It Takes

BHIS · 2018-05-17 · Read original ↗

ATT&CK techniques detected

3 predictions
T1071Application Layer Protocol
73%
"forms of c2 like vnc or ssh that are common as well. they can be very beneficial and make working on computers much easier than physically being in front of the machine. however, where something can be used for good, it can also be used for bad. on the evil side of c2, malware is…"
T1071.001Web Protocols
45%
"usually going to send out a beacon on a time basis to let the server know it is still alive and to see if there is anything it should do. when the server is ready, it will issue its command to execute on the infected host machine. because the hosts are not sending constant data o…"
T1071Application Layer Protocol
41%
"usually going to send out a beacon on a time basis to let the server know it is still alive and to see if there is anything it should do. when the server is ready, it will issue its command to execute on the infected host machine. because the hosts are not sending constant data o…"

Summary

Darin Roberts// If you have been in the security field for any length of time at all you have heard the term C2.  You might have heard it also called […]

The post C2, C3, Whatever It Takes appeared first on Black Hills Information Security, Inc..