❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

SSHazam: Hide Your C2 Inside of SSH

By: BHIS
8 January 2019 at 11:04

Carrie Roberts //* SSHazam is a method of running any C2 tool of your choice inside a standard SSH tunnel to avoid network detections. The examples here involve running PowerShell […]

The post SSHazam: Hide Your C2 Inside of SSH appeared first on Black Hills Information Security, Inc..

How To: C2 Over ICMP

By: BHIS
30 November 2018 at 10:32

Darin Roberts // In previous blogs, I have shown how to get various C2 sessions.Β  In this blog, I will be showing how to do C2 over ICMP. First, what […]

The post How To: C2 Over ICMP appeared first on Black Hills Information Security, Inc..

Command and Control with WebSockets WSC2

By: BHIS
26 July 2018 at 10:21

Craig Vincent// This all started with a conversation I was having with a few other BHIS testers. At the time, I was testing a web application that used WebSockets. The […]

The post Command and Control with WebSockets WSC2 appeared first on Black Hills Information Security, Inc..

PODCAST: Lee Kagan & Beau Bullock talk C2

Special guest Lee Kagan from RedBlack Security talks about his script, his previous guest posts and the future of C2 with Beau Bullock and Sierra. Check out these links: How […]

The post PODCAST: Lee Kagan & Beau Bullock talk C2 appeared first on Black Hills Information Security, Inc..

πŸ’Ύ

❌
❌