Command and Control (C2) Frameworks: Cobalt Strike and Beyond
A Command and Control (C2) framework is the centralized software used by threat actors to communicate with compromised systems (implants/beacons) within a victim's network. Modern ...
Your comprehensive reference for cyber threat intelligence terminology. Explore definitions of malware families, APT groups, attack techniques, and security concepts.
Showing 3 entries in Attack Techniques
Clear filtersA Command and Control (C2) framework is the centralized software used by threat actors to communicate with compromised systems (implants/beacons) within a victim's network. Modern ...
A Domain Generation Algorithm (DGA) is a technique used by malware to periodically generate a large number of domain names that can serve as Command and Control (C2) rendezvous poi...
A Supply Chain Attack occurs when an adversary infiltrates a system through an outside partner or provider with access to the systems and data. This dramatically alters the risk pr...