❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

Let’s Go Hunting! How to Hunt Command & Control Channels Using Bro IDS and RITA

By: BHIS
13 September 2017 at 10:55

Logan Lembke// Here at BHIS, we β™₯ Bro IDS. Imagine… Bro IDS Everywhere! If you haven’t encountered Bro IDS before, checkout thisΒ webcastΒ on John’s Youtube channel discussing the need for Bro […]

The post Let’s Go Hunting! How to Hunt Command & Control Channels Using Bro IDS and RITA appeared first on Black Hills Information Security, Inc..

Bypassing Cylance: Part 2 – Using DNSCat2

By: BHIS
28 March 2017 at 10:22

David Fletcher // The following techniques serve to illustrate methods for obtaining C2 communication in a particular Cylance protected environment.Β  The configuration of the centralized infrastructure and the endpoint agents […]

The post Bypassing Cylance: Part 2 – Using DNSCat2 appeared first on Black Hills Information Security, Inc..

PowerShell DNS Command & Control with dnscat2-powershell

By: BHIS
11 January 2017 at 13:04

Luke Baggett // Imagine a scenario where a Penetration Tester is trying to set up command and control on an internal network blocking all outbound traffic, except traffic towards a […]

The post PowerShell DNS Command & Control with dnscat2-powershell appeared first on Black Hills Information Security, Inc..

❌
❌