Time
8 hours 28 minutes
Difficulty
Beginner
CEU/CPE
10

Video Transcription

00:00
hello and welcome to another application of the minor attack framework discussion
00:05
today We're going to be giving into the next phase of the minor attack framework, command and control. So what is command and control? Well, command and control is when a threat actor will attempt to communicate with compromise systems to control them Commonly, threat actors mimic normal behavior to attempt to avoid detection.
00:24
This couldn't do include things like connection proxies,
00:27
data encoding and data off. Yes, cation. Now what will we be looking at specifically within our review, while we're going to look at things such as commonly used ports will discuss custom commanding control protocol
00:43
and some uncommonly used ports as well and how threat actors will go about
00:49
working their command and control activities.
00:52
So with that in mind, I want to thank you for your time today, and I look forward to seeing you again soon.

Up Next

Application of the MITRE ATT&CK Framework

This MITRE ATT&CK training is designed to teach students how to apply the matrix to help mitigate current threats. Students will move through the 12 core areas of the framework to develop a thorough understanding of various access ATT&CK vectors.

Instructed By

Instructor Profile Image
Robert Smith
Director of Security Services at Corsica
Instructor