Honey I Stole Your C2 Server - A Dive into Attacker Infrastructure

Honey I Stole Your C2 Server - A Dive into Attacker Infrastructure

via YouTube Direct link

Linux VM

15 of 30

15 of 30

Linux VM

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Honey I Stole Your C2 Server - A Dive into Attacker Infrastructure

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Who am I
  3. 3 Honey I Stole
  4. 4 Typical Mandiant investigation
  5. 5 We say goodbye
  6. 6 Weird service installs
  7. 7 Metasploit indicators
  8. 8 Metasploit investigation
  9. 9 Initial attack vector
  10. 10 Command and control
  11. 11 Encoding
  12. 12 Free Domain Tools
  13. 13 Windows Server
  14. 14 Linux ISO
  15. 15 Linux VM
  16. 16 PostgreSQL
  17. 17 VMDK
  18. 18 Change password
  19. 19 MSF console
  20. 20 Bypass metasploit
  21. 21 Medical credentials
  22. 22 Postcrash tables
  23. 23 Previous database drops
  24. 24 Postgres sequel
  25. 25 Postgres parser
  26. 26 Postgres header
  27. 27 Rows
  28. 28 Parser
  29. 29 Attacker Insights
  30. 30 Any questions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.