asteroza + c2   15

Publications | Outflank
DoH turning into a Doh! You may begin to hate yourselves...
virus  C2  secondary  communications  channel  beacon  DNS  DoH  HTTPS  SSL  TLS  SPF  security  hacking  pentesting  redteam 
october 2018 by asteroza
VPNFilter EXIF to C2 mechanism analysed - Securelist
Using GPS coordinates in JPEG EXIF as a source of C2 IP's is sneaky
malware  C2  JPEG  EXIF  GPS  encoding 
may 2018 by asteroza
TLS C2
Oh god, smuggling C2 commands in TLS cert subject names. I suppose it should be possible to be bidirectional using both server and client selfsign certs....
covert  channel  TLS  SSL  certificate  subject  name  C2  command  security  hacking  pentesting 
february 2018 by asteroza
Instegogram: Leveraging Instagram for C2 via Image Steganography | Endgame
Using social media image hosting with steganographically encoded C2 commands embedded in images for fun and profit...
malware  C2  command  control  remote  SNS  social  media  image  hosting  steganography  security  research  pentesting  hacking  Delicious 
october 2016 by asteroza

Copy this bookmark:



description:


tags: