Visibility Beyond Perimeters - Detecting C2 at Time of Execution

Visibility Beyond Perimeters - Detecting C2 at Time of Execution

BruCON Security Conference via YouTube Direct link

How we did this

7 of 22

7 of 22

How we did this

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Visibility Beyond Perimeters - Detecting C2 at Time of Execution

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Why is this important
  3. 3 Showdown
  4. 4 F51 vulnerability
  5. 5 Who found F51
  6. 6 What we found
  7. 7 How we did this
  8. 8 Gray Noise
  9. 9 Forensics
  10. 10 Showdown Hunting
  11. 11 Pro Tips
  12. 12 Ingram Micro
  13. 13 DNS
  14. 14 DNS IOCs
  15. 15 Ransomware
  16. 16 trojans
  17. 17 CTI League
  18. 18 Answering malware
  19. 19 Detecting malware
  20. 20 Detecting botnets
  21. 21 Conclusion
  22. 22 QA

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.