C2 Matrix
search
Ctrlk
C2 Matrix
  • The C2 Matrix
  • About
  • SANS Slingshot C2 Matrix VM
  • Contribute
  • Feedback
  • Lab Infrastructure
    • C2 Matrix Eval Lab
    • Basic Lab
    • Virtual Machines with C2s
    • Docker
    • Resources
  • C2
    • Caldera
    • Covenant
    • Deimos
    • Empire3
    • Empire5
    • Havoc
    • ibombshell
    • Koadic
    • Merlin
    • Mythic
    • Nuages
    • PoshC2
    • PowerHub
    • SilentTrinity
    • Sliver
    • SCYTHE
    • TrevorC2
  • Attack Infrastructure
    • Resources
    • Redirectors/Relays
  • Detection
    • Basics
    • Beacons
    • JA3/JA3S Hashes
    • JARM
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Detection

Basics

Detecting long connections:

  • https://www.blackhillsinfosec.com/detecting-long-connections-with-zeek-bro-and-rita/arrow-up-right

Detecting beacons:

  • https://www.activecountermeasures.com/threat-simulation-beaconsarrow-up-right

  • https://www.blackhillsinfosec.com/detecting-malware-beacons-with-zeek-and-rita/arrow-up-right

Detecting TLS C2:

  • Certificate Issues: https://www.activecountermeasures.com/threat-simulation-certificate-issues/arrow-up-right

  • https://www.activecountermeasures.com/threat-simulation-client-signatures-tls-signature/arrow-up-right

DNS:

  • https://www.activecountermeasures.com/threat-simulation-dns/arrow-up-right

PreviousRedirectors/Relayschevron-leftNextBeaconschevron-right

Last updated 5 years ago