Completed
C2 malware signatures
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Leviathan Command and Control Communications on Planet Earth - Kevin Thompson
Automatically move to the next video in the Classroom when playback concludes
- 1 FireEye
- 2 Whoami
- 3 Leviathan
- 4 Data
- 5 Worldwide malware ecosystem
- 6 C2 malware signatures
- 7 Tactics, techniques, and procedures
- 8 Every industry vertical owned
- 9 Callbacks: ebb and flow
- 10 Knock Knock
- 11 Hiding in Plain Site
- 12 Callback destinations from South Korea
- 13 Hiding in plain "site"
- 14 Targeted Callbacks
- 15 Semantic signatures
- 16 World C2 network map
- 17 Connectivity and malware
- 18 Callbacks by vertical / country
- 19 The king of malware
- 20 USA: the top callback destination
- 21 March in Russia/Ukraine
- 22 Geopolitical reflection: Ukraine crisis
- 23 Callbacks to Russia
- 24 RU-UA unique callbacks by country
- 25 Unique country callbacks
- 26 Israel: traffic analysis
- 27 Geopolitical reflection: Israel-Gaza crisis
- 28 Unique callbacks: CA to IL (2014)
- 29 Contact Info