C2 Matrix
Search
⌃K
The C2 Matrix
SANS Slingshot C2 Matrix VM
Contribute
Lab Infrastructure
C2 Matrix Eval Lab
Basic Lab
Virtual Machines with C2s
Docker
Resources
C2
Caldera
Covenant
Deimos
Empire3
Empire5
Havoc
ibombshell
Koadic
Merlin
Mythic
Nuages
PoshC2
PowerHub
SilentTrinity
Sliver
SCYTHE
TrevorC2
Attack Infrastructure
Resources
Redirectors/Relays
Detection
Basics
Beacons
JA3/JA3S Hashes
JARM
Powered By
GitBook
Basics
Detecting long connections:
https://www.blackhillsinfosec.com/detecting-long-connections-with-zeek-bro-and-rita/
Detecting beacons:
https://www.activecountermeasures.com/threat-simulation-beacons
https://www.blackhillsinfosec.com/detecting-malware-beacons-with-zeek-and-rita/
Detecting TLS C2:
Certificate Issues:
https://www.activecountermeasures.com/threat-simulation-certificate-issues/
https://www.activecountermeasures.com/threat-simulation-client-signatures-tls-signature/
DNS:
https://www.activecountermeasures.com/threat-simulation-dns/
Attack Infrastructure - Previous
Redirectors/Relays
Next - Detection
Beacons
Last modified
3yr ago