What is Command Control?

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
8 hours 29 minutes
Difficulty
Beginner
Video Transcription
00:00
hello and welcome to another application of the minor attack framework discussion
00:05
today We're going to be giving into the next phase of the minor attack framework, command and control. So what is command and control? Well, command and control is when a threat actor will attempt to communicate with compromise systems to control them Commonly, threat actors mimic normal behavior to attempt to avoid detection.
00:24
This couldn't do include things like connection proxies,
00:27
data encoding and data off. Yes, cation. Now what will we be looking at specifically within our review, while we're going to look at things such as commonly used ports will discuss custom commanding control protocol
00:43
and some uncommonly used ports as well and how threat actors will go about
00:49
working their command and control activities.
00:52
So with that in mind, I want to thank you for your time today, and I look forward to seeing you again soon.
Up Next