Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Pluralsight

Sandworm: C2 over HTTP Emulation

via Pluralsight

Overview

Discover how Advanced Persistent Threat (APT) Actors such as Sandworm use Web application protocols to establish command and control with victim environments.

During the 2022 Ukraine Electric Power Attack, the Sandworm Team deployed the Neo-REGEORG web shell on an internet-facing server. Web shells provide persistent remote access, facilitate privilege escalation, enable pivoting, and allow attackers to launch further attacks. They exploit various web vulnerabilities, including the use of dangerous PHP functions, inadequate user input sanitization, and the failure to implement file type allow listing. In the course Sandworm: C2 over HTTP Emulation, you will learn how advanced persistent threats (APTs) exploit these vulnerabilities to deploy web shells and gain full control of victim systems.

Syllabus

  • Sandworm: T1572: Protocol Tunneling 4mins
  • Resources 0mins

Taught by

Matthew Lloyd Davies

Reviews

Start your review of Sandworm: C2 over HTTP Emulation

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.