8 hours 28 minutes
hello and welcome to another application of the minor attack framework discussion
today We're going to be giving into the next phase of the minor attack framework, command and control. So what is command and control? Well, command and control is when a threat actor will attempt to communicate with compromise systems to control them Commonly, threat actors mimic normal behavior to attempt to avoid detection.
This couldn't do include things like connection proxies,
data encoding and data off. Yes, cation. Now what will we be looking at specifically within our review, while we're going to look at things such as commonly used ports will discuss custom commanding control protocol
and some uncommonly used ports as well and how threat actors will go about
working their command and control activities.
So with that in mind, I want to thank you for your time today, and I look forward to seeing you again soon.
Become an Incident Handler
In this Career Path, you will learn the incident response process, from building an incident ...
Information Security Fundamentals
The foundational networking and security concepts taught in this career path form the backbone of ...